Chapter 3. Enumeration: Choosing Your Targets Wisely
To successfully penetrate a secured environment you must have a good understanding of what you are facing. The enumeration data gathered will assist in determining target prioritization. By the end of this chapter, you should be able to choose which targets are ideal candidates for your initial attacks. Certain attack types make more "noise" than others, thus a targeted attack will be less likely to be noticed. Thanks to the hard work of the open source community we have a large selection of tools available to help us enumerate networks. In this chapter, we will discuss the following:
How to add an additional computer to our virtual lab
Advanced Nmap scanning techniques
Adding custom Nmap scripts to your arsenal
Saving time with SNMP
Base lining your target networks with PBNJ
Avoiding enumeration attempts—confusing the enemy
Note
Some examples in this chapter take advantage of firewalls and IDS logs to allow the reader to understand the impact...