Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Liệt kê được định nghĩa là khai thác các tên người dùng, tên máy, tài nguyên mạng, cổ phần và các dịch vụ tài nguyên chia sẻ, kỹ thuật liệt kê được tiến hành trong môi trường mạng nội bộ | Module III Enumeration Overview of System Hacking Cycle Step 1 Enumerate users Extract user names using Win 2K enumeration and SNMP probing Step 2 Crack the password Crack the password of the user and gain access to the system Step 3 Escalate privileges Escalate to the level of the administrator Step 4 Execute applications Plant keyloggers spywares and rootkits on the machine Step 5 Hide files Use steganography to hide hacking tools and source code Step 6 Cover your tracks Erase tracks so that you will not be caught What is Enumeration Enumeration is defined as extraction of user names machine names network resources shares and services Enumeration techniques are conducted in an intranet environment Enumeration involves active connections to systems and directed queries The type of information enumerated by intruders Network resources and shares Users and groups Applications and banners Auditing .