Enumeration in Hindi

CH-6 Enumeration

Enumeration ek attecker dwara ki jane wali vo process hai jisme attecker system ke baare me username user group oprating name network resources.port or services vagerah.Enumeration ka use attecker tab karta hai jab use pata karna ho ke target ke system mai username ,usergroup open port kitne hai compueter ka naam kya hai kitne services run ho rahe hai.aap ko lag raha hoga ki ye saari jaankari to hum footprinting scanning me pahle hi ektra kar chuke hai to Enumeration kyo karna scanning or Enumeration me antar hai. Enumeration me hacker attacker ke system ke saath ek active connection banal eta hai.vo target me enter  ho chukka hota hai.scanning or footprinting me attacker sirf bahar se jaankari ektra karta hai pan Enumeration me attacker victim ke system me enter ho chukka hota hai.
Ek blackhat hacker prosizer follow karta hai. Jaise ki 1st footprintin fir 2nd scanning or fir 3rd Enumeration.
Hum footprinting or scanning ke baare me jan chuke hai.
Inme attacker abhi tak system me enter nahi hua hai sirf tools ka use karkar jaankari ektra karta hai.par Enumeration target computer se ek active connection banal eta hai.
Enumeration ko 6 category me bata gaya hai.
1.   Net Bios
2.   SNMP
3.   LDAP
4.   NTP
5.   DNS
Isme attacker Net Bios ki vernunility ka sabse jyada faayda uthata hai.net bios port open hone ka matlab ye hai ki aapne file sharing or printer connection on rakha hai.jyadatar chote organization me 10 se 50 pc hote hai to vo ek dusare pc mai file share karne ke liye or print ke liye sharing on rakhi hoti hai.eisa hi cyber café mai bhi hota hai.hum koi bhi pc se print ka command dete hai to ek hi printer se print nikalti hai.isi liye ye organization blackhat hacker ka 1st target hota hai.

1.   Net Bios

Net bios ka matlab hota hai Network Basic Input Outpoot System.
Is ke open port hote hai 445,137,139.

IPC$- iska matlab hai ki inter process communication iska matlab ye hai ki victim ke computer ka firewall bhi hamare remot access ko roke nahi pati.hum us computer se connect ho chuke hote hai.maan lijiye ki aap koi computer pen make ke threw scanning karte hai or isme aap ko 445 ,137, 139 open milta hai ko aap maan lijiye ki sharing or printer connection on hai.
Isliye sabse pahle attacker scan karega or us port open mile to vo fir ye step par follow karega hai.

Isliye sabse pahle start par jaiye
Run me jaiye or CMD type kijiye
Or command prompt open kijiye.
Fir type kijiye
Nbtstat –A (Ip Address)
Like
Nbtstat –A 192.168.56.1

Iske baad hacks value dikhai dega agar isme 20 dikhai deti hai to iska matlab ye hai ki file sharing or printer sharing on hai.fir attacker us system me enter hone ka try karta hai.

Fir step 2 follow karta hai.

Net View \\ insert ip address here

Aap niche di gaye screen shot me dekh sakte hai.ki aapko uske share forder dikhai dege.
Isme aap dekh sakte hai ki konese forder share ho rahe hai.

Fir last command dena hoga

Net use \\ insert ip address \forder ka naam

Agar successful ka messege ata hai to aap samaj lijiye ki victim ka forder aap ke computer me aa chooka hai.

And than
Fir aap new cammond insert kijiye.

Net use x: \\192.168.56.1\E

To aap ko niche di gayi screen dikhai degi.

Fir  ye command use kijiye net use
\\192.168.56.1\IPC$ “” /u”

Ab aap ke victim ka forder aap ke pc me dikhai dega.


Previous
Next Post »