CH-6 Enumeration
Enumeration
ek attecker dwara ki jane wali vo process hai jisme attecker system ke baare me
username user group oprating name network resources.port or services
vagerah.Enumeration ka use attecker tab karta hai jab use pata karna ho ke
target ke system mai username ,usergroup open port kitne hai compueter ka naam
kya hai kitne services run ho rahe hai.aap ko lag raha hoga ki ye saari
jaankari to hum footprinting scanning me pahle hi ektra kar chuke hai
to Enumeration kyo karna scanning or Enumeration me antar hai. Enumeration
me hacker attacker ke system ke saath ek active connection banal eta hai.vo
target me enter ho chukka hota
hai.scanning or footprinting me attacker sirf bahar se jaankari ektra karta hai
pan Enumeration me attacker victim ke system me enter ho chukka hota hai.
Ek
blackhat hacker prosizer follow karta hai. Jaise ki 1st footprintin
fir 2nd scanning or fir 3rd Enumeration.
Hum
footprinting or scanning ke baare me jan chuke hai.
Inme
attacker abhi tak system me enter nahi hua hai sirf tools ka use karkar
jaankari ektra karta hai.par Enumeration target computer se ek active
connection banal eta hai.
Enumeration
ko 6 category me bata gaya hai.
1. Net
Bios
2. SNMP
3. LDAP
4. NTP
5. DNS
Isme
attacker Net Bios ki vernunility ka sabse jyada faayda uthata hai.net bios port
open hone ka matlab ye hai ki aapne file sharing or printer connection on rakha
hai.jyadatar chote organization me 10 se 50 pc hote hai to vo ek dusare pc mai
file share karne ke liye or print ke liye sharing on rakhi hoti hai.eisa hi
cyber café mai bhi hota hai.hum koi bhi pc se print ka command dete hai to ek
hi printer se print nikalti hai.isi liye ye organization blackhat hacker ka 1st
target hota hai.
1. Net
Bios
Net
bios ka matlab hota hai Network Basic Input Outpoot System.
Is
ke open port hote hai 445,137,139.
IPC$-
iska matlab hai ki inter process communication iska matlab ye hai ki victim ke
computer ka firewall bhi hamare remot access ko roke nahi pati.hum us computer
se connect ho chuke hote hai.maan lijiye ki aap koi computer pen make ke threw
scanning karte hai or isme aap ko 445 ,137, 139 open milta hai ko aap maan
lijiye ki sharing or printer connection on hai.
Isliye sabse pahle attacker scan karega or us port open mile to vo fir
ye step par follow karega hai.
Isliye sabse pahle start par jaiye
Run me jaiye or CMD type kijiye
Or command prompt open kijiye.
Fir type kijiye
Nbtstat –A (Ip Address)
Like
Nbtstat
–A 192.168.56.1
Iske baad hacks value dikhai dega agar isme 20 dikhai deti hai to iska
matlab ye hai ki file sharing or printer sharing on hai.fir attacker us system
me enter hone ka try karta hai.
Fir step 2 follow karta hai.
Net View \\ insert ip address here
Aap niche
di gaye screen shot me dekh sakte hai.ki aapko uske share forder dikhai dege.
Isme aap dekh sakte hai ki konese forder share ho rahe hai.
Fir last command dena hoga
Net use \\ insert ip address \forder ka naam
Agar
successful ka messege ata hai to aap samaj lijiye ki victim ka forder aap ke
computer me aa chooka hai.
And than
Fir aap new cammond insert kijiye.
Net use x: \\192.168.56.1\E
To
aap ko niche di gayi screen dikhai degi.
Fir ye command use kijiye net use
\\192.168.56.1\IPC$ “” /u”
Ab aap
ke victim ka forder aap ke pc me dikhai dega.
EmoticonEmoticon