Module 06 Enumeration
Which port numbers indicate NetBIOS is in use on a remote target?
135 to 139
Enumeration of Windows systems can be more difficult if port _______ is filtered.
139/TCP
Not counting the reserved character at the end, a NetBIOS name can contain a maximum of ________ characters.
15
Network Basic Input/Output System (NetBIOS)
A Windows programming interface that allows computers to communicate across a LAN.
enum4linux
A command line tool that allows you to enumerate information from Windows, Linux, and Samba systems. It is a wrapper around a number of other utilities, providing a unified, simplified script capable of collecting a significant amount of information.
Simple Network Management Protocol (SNMP)
An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
null session
An unauthenticated connection to a Windows system.
When performing enumeration on a system, which of the following can be extracted?
DNS information Hostnames Usernames Routing tables Group names SNMP information
The Nbtstat command is used to enumerate *nix systems. True or False?
False
Security testers conduct enumeration for which of the following reasons? (
Gaining access to shares and network resourcesObtaining user logon names and group memberships
Which of the following methods can be used to enumerate a Windows host?
Metasploit Framework Nmap rpcclient Built-in commands
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?
Net view
Which of the following tools can be used to enumerate Windows systems? (Choose all that apply.)
OpenVAS or Nessus Hyena
Which of the following is a commonly used UNIX enumeration tool?
SNMPWalk
Which of the following type of information can SuperScan extract using a scan?
Service status Network shares NetBIOS User and group accounts
Which of the type of enumeration cannot be performed?
TCP
enumeration
The process of connecting to a system and obtaining information such as logon names, passwords, group memberships, and shared resources.
True or False: The IP Network Browser is a network discovery tool using ICMP or SNMP.
True
True or False: The Net view command can be used to see whether there are any shared resources on a server.
True
What is the best method of preventing NetBIOS attacks?
filtering certain ports at the firewall
To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use?
nbtscan 193.145.85.0/24
Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145.85.202?
nbtstat -a 193.145.85.202
Which of the following commands connects to a computer containing shared files and folders?
net use
Most NetBIOS enumeration tools connect to the target system by using which of the following?
null sessions