Enumeration is a subset of footprinting, which comes under the second phase of Penetration Testing Execution Standard (PTES) intelligence gathering. The main advantage of performing enumeration is to find the attack endpoints from where we can launch the attacks or launch a pseudo attack payload to confirm whether the vulnerability exists in the same endpoint. In most penetration test cases, the tester spends around 60-70% of their time looking for information. This information is used by the tester to identify some new vulnerabilities. The better the enumeration, the better the result of the penetration test. In this chapter, we'll cover the following topics:
- Introduction to enumeration
- DNS enumeration
- Enumerating files
- Crawling and scraping with Metasploit