During the enumeration process, all of the information that we retrieved from the initial footprinting/reconnaissance will be in use for the first time. For pentesting a web application, we need to have an excellent understanding of the enumeration process. The better the recon and enumeration, the quicker and easier it is for us to find vulnerabilities in the web application. Using enumeration, we can find the following:
- Hidden files and directories
- Backup and configuration files
- Subdomains and virtual hosts
Let's first look at DNS enumeration and how we can enumerate the DNS using Metasploit.