Enumeration Techniques

DISCLAIMER!
This content is intended solely for educational and ethical purposes. The tested IP that is revealed is created by our lecturer and this activity is conducted with permission. IPs that are not created by our lecturer will be represented by xx.xx.xx.xx here. All activities related to cybersecurity must comply with available regulations. The author (me) is not responsible for any misuse or illegal activities performed using the knowledge shared here. Any actions taken by the readers using this info are at the reader’s own risk.  


Enumeration Techniques

From previous weeks, we already learned a lot of cybersecurity concepts and techniques, especially for gathering information about our target. Today, we will review some of the techniques and also the vital information that we can gather using these techniques.

First, I would like to introduce shodan.io, a search engine that finds and monitors devices connected to the internet so that we can monitor network exposure and conduct vulnerability assessments.

In the picture below, we will find devices that are in Indonesia and have port 445. Port 445 is a Microsoft networking port that allows systems on the same network to share files and printers.

From here, we can gather some information of the public IP address. For ethical purposes, I changed the IP address into xx.xx.xx.xx. Please do not try to hack into the system without the owner’s permission.

Next, we will review some of the enumeration techniques used to gather information about an IP address.


1.     The owner of the IPs

For this purpose, we can use the simplest command, which is whois [IP]. From here, we can know the owner of the IP is PT Royal Audrey Megah in Kelapa Gading, Jakarta.


2.     The IP-hosted location

There are two methods to get this. The first one is to use the IP lookup in the web and type the IP address.


The second one is to use the Kali Linux terminal and type curl http://ipinfo.io/[IP]/json. 

 

From both methods, we know that IP 120.89.92.15 is hosted in Jakarta, Indonesia.

 

 

3.     OS and Services Version

For OS and services version, we can use nmap to get it. We will use nmap -A -Pn -T4 -v [IP] to get it (-A means aggressive and get all detailed information, -Pn (no ping) means that treats all hosts as online, -T4 means that we set scan speed to aggressive rather than the default T3, and -v (verbose) means that we print the detailed logs when scanning). To only get the OS version, we can use -O instead of -A.

Below is some crucial information that we got from the scanning.

We got the information about the ports that are open in the system.

We get the OS and services version of the IP.

 

 

4.     Files and Folders Shared

For this purpose, we can use smbclient -L [IP] to get the information.

We can see the shared files and folders of this IP address. The word $ means that it is hidden.

 


Additional Info

We can also get NetBIOS information using nbtscan [IP]. From here, we can retrieve the MAC address of the IP address, too.



I think that’s all for this page. Thank you for reading!



Comments

Popular Posts