Enumerating network services
During the host discovery phase of ethical hacking, many open ports and running services can be found. The information collected during the host discovery phase is used to perform additional research to find known security vulnerabilities within those running services and how they can be exploited to gain unauthorized access to a target. Enumerating network services on targeted systems helps ethical hackers and penetration testers to better understand the target’s network infrastructure and attack surfaces and which attack vectors can be used to deliver a payload to the target.
NetBIOS and SMB enumeration
Network Basic Input/Output System (NetBIOS) is an old legacy network protocol that’s commonly used within Windows-based environments for file and print sharing, and name resolution services on a Local Area Network (LAN). SMB is a newer network protocol that’s also used within Windows-based environments for file and print-sharing...