Lab 7: Perform Enumeration using Various Enumeration Tools

 

Lab 7: Perform Enumeration using Various Enumeration Tools

Module 04: Enumeration

Lab 7: Perform Enumeration using Various Enumeration Tools


Task 1: Enumerate Information using Global Network Inventory


Task 2: Enumerate Network Resources using Advanced IP Scanner


Task 3: Enumerate Information from Windows and Samba Hosts using Enum4linux




The details obtained in the previous steps might not reveal all potential vulnerabilities in the target network.

 There may be more information available that could help attackers to identify loopholes to exploit. As an ethical hacker, 

you should use a range of tools to find as much information as possible about the target network’s systems. This lab activity

 will demonstrate further enumeration tools for extracting even more information about the target system.



refer to blog



Lab Scenario

The details obtained in the previous steps might not reveal all potential vulnerabilities in the target network. There may be more information available that could help attackers to identify loopholes to exploit. As an ethical hacker, you should use a range of tools to find as much information as possible about the target network’s systems. This lab activity will demonstrate further enumeration tools for extracting even more information about the target system.

Lab Objectives

  • Enumerate information using Global Network Inventory

  • Enumerate network resources using Advanced IP Scanner

  • Enumerate information from Windows and Samba host using Enum4linux

Overview of Enumeration Tools

To recap what you have learned so far, enumeration tools are used to collect detailed information about target systems in order to exploit them. The information collected by these enumeration tools includes data on the NetBIOS service, usernames and domain names, shared folders, the network (such as ARP tables, routing tables,traffic, etc.), user accounts, directory services, etc.

Task 1: Enumerate Information using Global Network Inventory

Global Network Inventory is used as an audit scanner in zero deployment and agent-free environments. It scans single or multiple computers by IP range or domain, as defined by the Global Network Inventory host file.

Here, we will use the Global Network Inventory to enumerate various types of data from a target IP address range or single IP.

  1. Click Windows 10 to switch to the Windows 10 machine, navigate to D:\CEH-Tools\CEHv11 Module 03 Scanning Networks\Scanning Tools\Global Network Inventory; then, double-click gni_setup.exe.

    If a User Account Control pop-up appears, click Yes.

  2. The Global Network Inventory - InstallShield Wizard appears. Follow the steps to install the application, using the default settings.

  3. On completing the installation, ensure that the Launch Global Network Inventory checkbox is selected in the Global Network Inventory - InstallShield Wizard window; click Finish.

    L7T13.jpg

  4. The About Global Network Inventory wizard appears; click I Agree.

    L7T14.jpg

  5. The Global Network Inventory GUI appears. Click Close on the Tip of the Day pop-up.

  6. The New Audit Wizard window appears; click Next.

    L7T16.jpg

  7. Under the Audit Scan Mode section, click the Single address scan radio button, and then click Next.

    You can also scan an IP range by clicking on the IP range scan radio button, after which you will specify the target IP range.

    L7T17.jpg

  8. Under the Single Address Scan section, specify the target IP address in the Name field of the Single address option (in this example, the target IP address is 10.10.10.16); Click Next.

    L7T18.jpg

  9. The next section is Authentication Settings; select the Connect as radio button and enter the Windows Server 2016 machine credentials (Domain\Username: Administrator and Password: Pa$$w0rd), and then click Next.

    In reality, attackers do not know the credentials of the remote machine(s). In this situation, they choose the Connect as currently logged on user option and perform a scan to determine which machines are active in the network. With this option, they will not be able to extract all the information about the target system. Because this lab is just for assessment purposes, we have entered the credentials of the remote machine directly.

    L7T19.jpg

  10. In the final step of the wizard, leave the default settings unchanged and click Finish.

    L7T110.jpg

  11. The Scan progress window will appear.

    Screenshot

  12. The results are displayed when the scan finished. The Scan summary of the scanned target IP address (10.10.10.16) appears.

    The scan result and summary in each tab might vary in your lab environment.

    Screenshot

  13. Hover your mouse cursor over the Computer details under the Scan summary tab to view the scan summary, as shown in the screenshot.

    L7T114.jpg

  14. Click the Operating System tab and hover the mouse cursor over Windows details to view the complete details of the machine.

    L7T115.jpg

  15. Click the BIOS tab, and hover the mouse cursor over windows details to display detailed BIOS settings information.

    L7T116.jpg

  16. Click the NetBIOS tab, and hover the mouse cursor over any NetBIOS application to display the detailed NetBIOS information about the target.

    Hover the mouse cursor over each NetBIOS application to view its details.

    L7T117.jpg

  17. Click the User groups tab and hover the mouse cursor over any username to display detailed user groups information.

    Hover the mouse cursor over each username to view its details.

    L7T118.jpg

  18. Click the Users tab, and hover the mouse cursor over the username to view login details for the target machine.

    L7T119.jpg

  19. Click the Services tab and hover the mouse cursor over any service to view its details.

    L7T120.jpg

  20. Click the Installed software tab, and hover the mouse cursor over any software to view its details.

    L7T121.jpg

  21. Click the Shares tab, and hover the mouse cursor over any shared folder to view its details.

    L7T122.jpg

  22. Similarly, you can click other tabs such as Computer SystemProcessorsMain boardMemorySNMP systemsMain board, and Hot fixes. Hover the mouse cursor over elements under each tab to view their detailed information.

  23. This concludes the demonstration of performing enumeration using the Global Network Inventory.

  24. Close all open windows and document all the acquired information.


Task 2: Enumerate Network Resources using Advanced IP Scanner

Advanced IP Scanner provides various types of information about the computers on a target network. The program shows all network devices, gives you access to shared folders, provides remote control of computers (via RDP and Radmin), and can even remotely switch computers off.

Here, we will use the Advanced IP Scanner to enumerate the network resources of the target network.

  1. Click Windows Server 2019 to switch to the Windows Server 2019 machine.

  2. Navigate to Z:\CEHv11 Module 03 Scanning Networks\Ping Sweep Tools\Advanced IP Scanner and double-click Advanced_IP_Scanner_2.5.3850.exe.

  3. Follow the installation steps to install Advanced IP Scanner, using all the default settings.

  4. After the installation completes, ensure that the Run Advanced IP Scanner option is selected and click Finish.

    L7T24.jpg

  5. The Advanced IP Scanner GUI appears, as shown in the screenshot.

    Screenshot

  6. In the IP address range field, specify the IP range (in this example, we will target 10.10.10.5-10.10.10.20). Click the Scan button.

    L7T266.jpg

  7. Advanced IP Scanner scans the target IP address range, with progress tracked by the status bar at the bottom of the window. Wait for the scan to complete.

    L7T27.jpg

  8. The scan results appear, displaying information about active hosts in the target network such as status, machine name, IP address, manufacturer name, and MAC addresses, as shown in the screenshot.

    L7T28.jpg

  9. Click the Expand all icon to view the shared folders and services running on the target network.

    L7T29.jpg

  10. The shared folders and services running on the target network appear, as shown in the screenshot.

    L7T210.jpg

  11. Right-click any of the detected IP addresses to list available options.

    L7T211111.jpg

  12. Using these options, you can ping, traceroute, transfer files, chat, send a message, connect to the target machine remotely (using Radmin), etc.

    To use the Radmin option, you need to install Radmin viewer, which you can download at http://www.radmin.com.

  13. In the same way, you can select various other options to retrieve shared files, view system-related information, etc.

  14. This concludes the demonstration of enumerating network resources using Advanced IP Scanner.

  15. Close all open windows and document all the acquired information.


Task 3: Enumerate Information from Windows and Samba Hosts using Enum4linux

Enum4linux is a tool for enumerating information from Windows and Samba systems. It is used for share enumeration, password policy retrieval, identification of remote OSes, detecting if hosts are in a workgroup or a domain, user listing on hosts, listing group membership information, etc.

Here, we will use the Enum4Linux to perform enumeration on a Windows and a Samba host.

  1. Click Parrot Security to switch to the Parrot Security machine.

  2. Click the MATE Terminal icon at the top of the Desktop window to open a Terminal window.

    111.jpg

  3. Parrot Terminal window appears. In the terminal window, type sudo su and press Enter to run the programs as a root user.

  4. In the [sudo] password for attacker field, type toor as a password and press Enter.

    The password that you type will not be visible.

  5. Now, type cd and press Enter to jump to the root directory.

    Screenshot

  6. In the Parrot Terminal window, type enum4linux -h and press Enter to view the various options available with enum4linux.

  7. The help options appear, as shown in the screenshot. In this lab, we will demonstrate only a few options to conduct enumeration on the target machine.

    Screenshot

  8. We will first enumerate the NetBIOS information of the target machine. In the terminal window, type enum4linux -u martin -p apple -n [Target IP Address] (in this case, 10.10.10.16) and hit Enter.

    In this command, -u user specifies the username to use and -p pass specifies the password.

    Screenshot

  9. The tool enumerates the target system and displays the NetBIOS information under the Nbtstat Information section, as shown in the screenshot.

    Screenshot

  10. In the terminal window, type enum4linux -u martin -p apple -U [Target IP Address] (in this case, 10.10.10.16) and hit Enter to run the tool with the “get userlist” option.

    In this case, 10.10.10.16 is the IP address of the Windows Server 2016; this might be different in your lab environment.

    Screenshot

  11. Enum4linux starts enumerating and displays data such as Target Information, Workgroup/Domain, domain SID (security identifier), and the list of users, along with their respective RIDs (relative identifier), as shown in the screenshots below.

    Screenshot

    Screenshot

  12. Second, we will obtain the OS information of the target; type enum4linux -u martin -p apple -o [Target IP Address] (in this case, 10.10.10.16) and hit Enter.

    Screenshot

  13. The tool enumerates the target system and lists its OS details, as shown in the screenshot.

    Screenshot

    Screenshot

  14. Third, we will enumerate the password policy information of our target machine. In the terminal window, type enum4linux -u martin -p apple -P [Target IP Address] (in this case, 10.10.10.16) and hit Enter.

    Screenshot

  15. The tool enumerates the target system and displays its password policy information, as shown in the screenshot.

    Screenshot

  16. Fourth, we will enumerate the target machine’s group policy information. In the terminal window, type enum4linux -u martin -p apple -G [Target IP Address] (in this case, 10.10.10.16) and hit Enter.

    Screenshot

  17. The tool enumerates the target system and displays the group policy information, as shown in the screenshot.

    Screenshot

  18. It further enumerates the built-in group memberships, local group memberships, etc. displaying them as shown in the screenshot.

    Screenshot

  19. Finally, we will enumerate the share policy information of our target machine. Type enum4linux -u martin -p apple -S [Target IP Address] (in this case, 10.10.10.16) and hit Enter.

    Screenshot

  20. The result appears, displaying the enumerate shared folders on the target system.

    Screenshot

  21. This concludes the demonstration performing enumeration using Enum4linux.

  22. Close all open windows and document all the acquired information.

Comments

Popular posts from this blog

Lab 1: Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools

Lab 5: Perform Cryptanalysis using Various Cryptanalysis Tools

Task 2: Perform OS Discovery using Nmap Script Engine (NSE)