Escolar Documentos
Profissional Documentos
Cultura Documentos
Enumeration
Module 04
Enumeration
E n u m e r a t i o n i s th e p r o c e s s o f e x tr a c tin g u s e r n a m e s , m a c h in e n a m e s , n e tir o r k
r e s o u r c e s , s h a r e s , a n d s e r v ic e s f r o m
a s y s te m . E
n u m e r a t i o n i s c o n d u c te d i n a n
i n t r a n e t e n v ir o n m e n t.
I CON
KEY
/ Valuable
information
y Test your
knowledge
Web exercise
Workbook review
Lab Scenario
Penetration testing is much more than just running exploits against vulnerable
systems like we learned 111 the previous module. 111 fact a penetration test begins
before penetration testers have even made contact with the victim systems.
As an expert ethical hacker and penetration tester you must know how to
enum erate target networks and extract lists of computers, user names, user
groups, ports, operating systems, machine names, network resources, and services
using various enumeration techniques.
Lab Objectives
The objective of tins lab is to provide expert knowledge
enumeration and other responsibilities that include:
011
network
011
individual hosts
011
the network
Lab Environment
To earn out die lab, you need:
Windows Server 2012 as host machine
Windows Server 2008, Windows 8 and Windows 7 a s virtual machine
Lab Duration
Time: 60 Minutes
Overview of Enumeration
Enumeration is the process of extracting user names, machine names, network
resources, shares, and services from a system. Enumeration techniques are
conducted 111 an intranet environment.
C E H L ab M an u al P ag e 267
Module 04 - Enumeration
TASK 1
Overview
Lab Tasks
Recommended labs to assist you 111 Enumeration:
Enumerating a Target Network Using Nmap Tool
Enumerating NetBIOS Using the SuperScan Tool
Enumerating NetBIOS Using the NetBIOS Enumerator Tool
Enumerating a Network Using the S oftP erfect Network Scanner
Enumerating a Network Using SolarWinds T oolset
Enumerating the System Using Hyena
Lab Analysis
Analyze and document the results related to die lab exercise. Give your opinion on
your targets security posture and exposure.
C E H L ab M an u al Page 268
Module 04 - Enumeration
I CON
KEY
._ Valuable
information
Test your
knowledge
OT Web exercise
c a Workbook review
a s y s te m .
Lab Scenario
111 fact, a penetration test begins before penetration testers have even made contact
with the victim systems. During enumeration, information is systematically collected
and individual systems are identified. The pen testers examine the systems in their
entirety, which allows evaluating security weaknesses. 111 tliis lab, we discus Nmap; it
uses raw IP packets 111 novel ways to determine what hosts are available on die
network, what services (application name and version) those hosts are offering, what
operating systems (and OS versions) they are running, what type of packet
biters/firewalls are 111 use, it was designed to rapidly scan large networks. By using
the open ports, an attacker can easily attack the target machine to overcome this
type of attacks network filled with IP filters, firewalls and other obstacles.
Lab Objectives
The objective ot tins lab is to help students understand and perform enumeration
on target network using various techniques to obtain:
User names and user groups
Lists of computers, their operating systems, and the ports on them
Machine names, network resources, and services
Lists of shares on the individual hosts on die network
Policies and passwords
C E H L ab M an u al Page 269
Module 04 - Enumeration
& Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 04
Enumeration
Lab Environment
To perform die kb, you need:
A computer running Windows Server 2008 as a virtual machine
A computer running with Windows Server 2012 as a host machine
Nmap is located at D:\CEH-Tools\CEHv8 Module 04
Enumeration\Additional Enumeration Pen Testing Tools\Nmap
Lab Duration
Time: 10 Minutes
Overview of Enumeration
Take a snapshot (a
type o f quick backup) o f
your virtual machine before
each lab, because if
something goes wrong, you
can go back to it.
Lab Tasks
The basic idea 111 diis section is to:
Perform scans to find hosts with NetBIOS ports open (135,137-139, 445)
Do an nbtstat scan to find generic information (computer names, user
names, ]MAC addresses) on the hosts
Create a Null Session to diese hosts to gain more information
Install and Launch Nmap 111 a Windows Server 2012 machine
TASK 1
1. Launch the Start menu by hovering the mouse cursor on the lower-left
corner of the desktop.
WinPcap 4.1.1
Network Interface
Im port
Zenmap (GUI frontend)
Module 04 - Enumeration
5 t3 T t
Administrator
Server
Manager
Windows
PowerShell
Google
Chrome
Hyper-V
Manager
Nmap Zenmap
GUI
r=
ft
Computer
Central
Panel
Hyper-V
Virtual
Machine...
SQL Server
Installation
Center...
*J
Command
Prompt
liflgnr
Mozilla
Firefox
Global
Network
Inventory
MegaPing
HTTPort
3.SNFM
sS
!*
0c*3Of
1!
Tools
Profile
Help
[v ]
10.0.0.6
Command:
Profile:
[Scan]
|Cancel
nmap 10.0.0.6 0
Nmap Output Ports / Hosts [ Topology | Host Details | Scans
Nmap performs a sca n for die provided target IP address and outputs die
results on die Nmap Output tab.
Nmap.org is die
official source for
downloading N m ap source
code and binaries for
N m ap and Zenmap.
C E H L ab M an u al Page 271
Module 04 - Enumeration
Zenmap
TASK 2
Scan
Tools
rofile
Help
Command:
||Scani
nmap -0 10.0.0.6
Services
OS < Host
-
Profile
10.0.0.6
10.0.0.6
S ta r t in g
Nmap 6 .0 1
( h ttp ://n m a p .o r g
) a t 2 0 1 2 -0 9 -0 4 1 0 :5 5
Nmap sca n r e p o r t f o r 1 0 . 0 . 0 . 6
H o s t i s up ( 0 .0 0 0 1 1 s l a t e n c y ) .
N o t show n: 993 f i l t e r e d p o r t s
PORT
STATE SERVICE
1 3 5 / tc p
open
m srpc
1 3 9 / tc p
open
n e t b io s - s s n
open
4 4 5 /tc p
r o ic r o s o f t - d s
open
5 5 4 / tc p
rts p
open
2 8 6 9 /tc p
ic s l a p
5 3 5 7 /tc p
open
w sdapi
1 0 2 4 3 /tc p open
unknown
( M ic r o s o f t )
MAC A d d re s s : W a rn in g : OSScan r e s u l t s may b
n o t f i n d a t l e a s t 1 open and 1 c lo s e d p o r t
D e v ic e t y p e : g e n e r a l p u rp o s e
R u n n in g : M i c r o s o f t W indows 7 | V i s t a | 2008
OS CPE: c p e : / o : m i c r o s o f t : w in d o w s _ 7 : : p r o f e s s io n a l c p e : /
o : m ic r o s o f t : w in d o w s _ v is t a : : c p e : /
n r r n c n ^ t u i n H n w c
Filter Hosts
%/ c t s c n l
rn s /
8. Now you see that ports 139 and 445 are open and port 139 is using
NetBIOS.
9.
Now launch die com m and prompt 111 W indows Server 2008 virtual
machine and perform nbtstat on port 139 ot die target machine.
c A d m in is tr a to r C om m and P ro m p t
C : \ U s e r s \ A d n in is tr a t o r > n b ts t a t
N map has
traditionally been a
command-line tool run
from a U N IX shell or
(more recently) a Windows
command prompt.
L o c a l A re a C o n n e c tio n 2 :
Node I p A d d r e s s : [ 1 0 . 0 . 0 . 31
N e tB IO S
R e m o te
Nane
W IN - D 3 9 M R S H L9E 4<0 0 >
WORKGROUP
<00>
W IN -D 3 9 M R 5 H L 9 E 4 < 2 0 >
MAC A d d r e s s
= D . J l. A
-A
1 0 .0 .0 .?
S cope
Id :
M a c h in e
[1
Name T a b l e
Type
S ta tu s
U N IQ U E
GROUP
U N IQ U E
R e g is te re d
R e g is te re d
R e g is te re d
J1_-2D
C :\U s e r s \A d n in is tr a to r >
zl
FIGURE 1.5: Command Prompt with die nbtstat command
11. We have not even created a null s e s s io n (an unaudienticated session) yet,
and we can still pull tins info down.
3
t a s k
Create a Null
Session
C E H L ab M an u al Page 272
Module 04 - Enumeration
13. 111 the command prompt, type net u se \\X.X.X.X\IPC$ /u: (where
X.X.X.X is die address of die host machine, and diere are no spaces
between die double quotes).
cs.Administrator:Command Prompt
C:\'net use \\10.0.0.7\IPC$ ""/u:""
Local name
Renote name
W10.0.0.7\IPC$
Resource type
IPC
Status
OK
# Opens
0
tt Connections
1
The command completed successfully.
&
N et Command
Syntax: N E T [
ACCOUNTS |
COM PUTER | C O N FIG
| C O N T IN U E | FILE |
G R O U P | H ELP |
HELPM SG |
LOCALGROUP | NAME
| PAUSE | PRIN T |
SEN D | SESSION |
SHARE | START |
STATISTICS | STOP |
TIM E | USE | USER |
VIEW ]
C:\>
FIGURE 1.6: The command prompt with the net use command
FIGURE 1.7: The command prompt ,with the net use command
Lab Analysis
Analyze and document die results related to die lab exercise. Give your opinion on
your targets security posture and exposure.
C E H L ab M an u al Page 273
Module 04 - Enumeration
T ool/U tility
N m ap
Questions
1. Evaluate what nbtstat -A shows us for each of the Windows hosts.
2. Determine the other options ot nbtstat and what each option outputs.
3. Analyze the net u se command used to establish a null session on the target
machine.
Internet C onnection Required
Yes
0 No
Platform Supported
0 Classroom
C E H L ab M an u al Page 274
0 !Labs
Module 04 - Enumeration
Lab
KEY
[Z7 Valuable
information
Test your
knowledge
Web exercise
m Workbook review
Lab Scenario
During enumeration, information is systematically collected and individual systems
are identified. The pen testers examine the systems 111 their entirety; tins allows
evaluating security weaknesses. 111 this lab we extract die information of NetBIOS
information, user and group accounts, network shares, misted domains, and
services, which are either running or stopped. SuperScan detects open TCP and
UDP ports on a target machine and determines which services are nuining on those
ports; by using this, an attacker can exploit the open port and hack your machine. As
an expert ethical hacker and penetration tester, you need to enumerate target
networks and extract lists of computers, user names, user groups, machine names,
network resources, and services using various enumeration techniques.
Lab Objectives
The objective of tins lab is to help students learn and perform NetBIOS
enumeration. NetBIOS enumeration is carried out to obtain:
List of computers that belong to a domain
List of shares on the individual hosts on the network
Policies and passwords
C E H L ab M an u al Page 275
Module 04 - Enumeration
Lab Environment
& Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 04
Enumeration
You can also download the latest version of SuperScan from tins link
http://www.mcatee.com/us/downloads/tree-tools/superscan.aspx
A computer running Windows Server 2012 as host machine
Lab Duration
Time: 10 Minutes
c.
b. Checks for user accounts with passwords diat are same as die
usernames 111 lower case
Lab Tasks
m. TASK 1
Perform
Enumeration
C E H L ab M an u al Page 276
Module 04 - Enumeration
Windows XP Service
Pack 2 has removed raw
sockets support, which
now limits SuperScan and
many other network
scanning tools. Some
functionality can be
restored by running the net
stop Shared Access at the
Windows command
prom pt before starting
SuperScan.
IP address import
supporting ranges and
CIDR formats
>^Tx
SuperScan 4.0
Scan | Host and Service Discovery | Scan Options | Tools | Windows Emmefabon"| About |
H o stn a m e /IP /U R L
10008
Enumerate
Options...
Clear
Enumeration Type
0 Workstation type
0 Users
Groups
Extensive banner
grabbing
0 Shares
0 Domains
0 Remote Tme of Day
0
0
Logon Sessions
0 Drives
Trusted Domains
0 Services
0 Registry
A collection o f useful
tools (ping, traceroute,
Whois etc.)
Extensive Windows host
enumeration capability
-J
Ready
Module 04 - Enumeration
6. SuperScan starts enum erating the provided hostname and displays the
results 111 the right pane of the window.
%
You can use
SuperScan to perform port
scans, retrieve general
network information, such
as name lookups and
traceroutes, and enumerate
Windows host information,
such as users, groups, and
services.
SuperScan 4.0
Scan | Host and Service Discovery | Scan Options | Tools
H o stn a m e /I P /U R L
10.0.0.8
Enumerate
Options...
Enumeration Type
NetBIOS Name Table
W\ NULL Session
0
'
MAC Addresses
4 names in table
AOMIN
WORKGROUP
ADMIN
WORKGROUP
0 Workstation type
0
Users
Groups
00
00
20
IE
UNIQUE
CROUP
UNIQUE
GROUP
MAC address 0
'
0 Account Policies
0
0
un
s.
Shares
Domains
Logon Sessions
Drives
Trusted Domains
Services
Registiy
on 10.0.0.8
Users on 10.0.0.8
Groups on 10.0.0.8
Ready
1 ^ 1
SuperScan 4.0
Scan | Host and Service Discovery | Scan Options | Tools
H o stn a m e /I P /U R L
10.0.0.8
Enumerate |
Options...
Enumeration Type
Clear
M
NULL Session
MAC Addresses
0 Workstation type
0
Users
Groups
Shares on 10.0.0.8
Domains on 10.0.0.8
0 Account Pofccies
on
a>
Shares
Domasis
Logon Sessions
Drives
Trusted Domains
Services
Registry
Drives on 10.0.0.8
Enumeration complete 1
1
Ready
Erase Results
C E H L ab M an u al Page 278
Module 04 - Enumeration
10. To perform a new enumeration on another host name, click the Clear
button at the top right of the window. The option erases all the
previous results.
'IT
H o stn a m e /I P /U R L
10008
Enumeration Type
NULL Session
MAC Addresses
0 Workstation type
0
Users
Groups
0 Account Pofccies
0
03
1 ^
SuperScan 4.0
Shares
Domans
Remote Tm e 0/ Day
Logon Sessions
Drives
Trusted Domains
Services
Registiy
Enumerate |
Binding:
Object Id:
Annotation:
Entry 25
Interface:
1.0
Binding:
Object Id:
Annotation:
Entry 26
Interface:
1.0
Binding:
Object Id:
Annotation:
Entry 27
Interface:
1.0
Binding:
Object Id:
Annotation:
Entry 28
Interface:
Oea,
ncacn_ip_tcp:10.0.0.8[49154]
0 0 0 0 0 0 0 0 -0 0 0 0 -0 0 0 0 -0 0 0 0 - 0 0 0 0 0 0 0 0 0 0 0 0
"XctSrv service"
Ia0d010f-lc33-432c-b0f5-8cf4e8053099" ver
"ncacn_np:10.0.0.8[\\PIPE\\at*vc]"
" 0 00 0 00 00 - 0 00 0 - 0 00 0- 0 00 0- 0 00 0 00 00 0 00 0
"IdSagSrv trvic"
Ia0d010f-lc33432cb 0 f S 8 cf4a3053099" ver
"ncacn_ip_tcp:10.0.0.8[49154]
0 0 0 0 0 0 0 0 -0 0 0 0 -0 0 0 0 -0 0 0 0 - 0 0 0 0 0 0 0 0 0 0 0 0
"IdSegSrv service"
"880fd55e-43b9-lle0-bla8-cf4edfd72085" ver
"ncacn_np:10.0.0.8 [WPIPSWatsvc] "
" 00000000- 0000- 0000- 0000- 000000000000
1.0
Binding:
Object Id:
Annotation:
Entry 29
Interface:
"ncacn_ip_tcp:10.0.0.8[49154]
0 00 0 00 00 - 0 000- 0 00 0- 0 00 0- 0 00 0 00 00 0 00 0
Ready
Lab Analysis
Analyze and document die results related to die lab exercise. Give your opinion on
your targets security posture and exposure.
T ool/U tility
SuperScan Tool
Null Session
MAC Address
Work Station Type
Users
Groups
Domain
Account Policies
Registry
Module 04 - Enumeration
Questions
1. Analyze how remote registry enumeration is possible (assuming appropriate
access nghts have been given) and is controlled by the provided registry.txt
tile.
2. As far as stealth is concerned, tins program, too, leaves a rather large
footprint in die logs, even 111 SYN scan mode. Determine how you can
avoid tins footprint 111 the logs.
Internet C onnection Required
Yes
0 No
Platform Supported
0 Classroom
C E H L ab M an u al Page 280
0 !Labs
Module 04 - Enumeration
3
Enumerating NetBIOS Using the
NetBIOS Enumerator Tool
Enumeration is theprocess of probing identified servicesfor known weaknesses.
I CON
KEY
/ Valuable
information
Test your
knowledge
g
Web exercise
Workbook review
Lab Scenario
Enumeration is the first attack 011 a target network; enumeration is the process of
gathering the information about a target machine by actively connecting to it.
Discover NetBIOS name enumeration with NBTscan. Enumeration means to
identify die user account, system account, and admin account. 111 tins lab, we
enumerate a machines user name, MAC address, and domain group. You must
have sound knowledge of enumeration, a process that requires an active connection
to the machine being attacked. A hacker enumerates applications and banners 111
addition to identifying user accounts and shared resources.
Lab Objectives
The objective of this lab is to help students learn and perform NetBIOS
enumeration.
Tlie purpose of NetBIOS enumeration is to gather the following information:
Account lockout threshold
Local groups and user accounts
C E H L ab M an u al Page 281
Blank passwords
111
lower case
Lab Environment
To earn out die lab, you need:
Module 04 - Enumeration
You can also download the latest version of NetBIOS Enumerator from
the link h ttp :// nbtenum.sourceforge.11et/
If you decide to download the latest version, then screenshots shown m
the lab might differ
Run tins tool 111 W indows Server 2012
Administrative privileges are required to run this tool
Lab Duration
Time: 10 Minutes
Overview of Enumeration
Enumeration involves making active connections, so that they can be logged.
Typical information attackers look for 111 enumeration includes user account names
for future password guessing attacks. NetBIOS Enumerator is an enumeration tool
that shows how to use rem ote network support and to deal with some other
interesting web techniques, such as SMB.
Lab Tasks
NetBIOS Enumerator
fkjIP range to scan
from: |
to :||
Scan
Clear
Settings
Performing
Enumeration
using NetBIOS
Enumerator
1X
TASK 1
[1...254]
Debug window
NetBIOS is designed
to help troubleshoot
NetBIOS name resolution
problems. W hen a network
is functioning normally,
NetBIOS over T C P /IP
(NetBT) resolves NetBIOS
names to IP addresses.
C E H L ab M an u al Page 282
Module 04 - Enumeration
2. In the IP range to scan section at the top left of the window, enter an IP
range in from and to text fields.
3. Click Scan.
m
Feature:
T ZL ^1 *
NetBIOS Enumerator
Added port scan
G U I - ports can be
added, deleted, edited
Dynamic memory
management
IP range to scan
fron :| 10.0.0.1
to | 10.0.0.501
Scan
Clear
'
Settings
[1...254]
Debug window
Network function
SMB scanning is also
implemented and running.
m The network
function,
N etServerGetlnfo, is also
implemented in this tool.
5. After the compledon of scanning, die results are displayed in die left pane
of die window.
6. A Debug window section, located 111 the right pane, shows the scanning of
die inserted IP range and displays Ready! after completion of the scan.
Module 04 - Enumeration
NetBIOS Enumerator
f i ) IP rang e to scan
Scan
from :| 1 0 .0 .0 .1
]1 0 .0 .0 .7
to : | 1 0 .0 .0 .5 0
B?
0
[1 ...2 5 4 ]
Debog window
1 0 .0 .0 .3 [W IN-ULY858KHQIP]
|U
Settings
l~ 2 f
Scanning from:
to : 1 0 .0 .0 .5 0
R eady!
Domain: WORKGROUP
S ?
3
1 0 .0 .0 .6 [ADMIN-PC]
H I N etB IO S Names (6)
,r
-1
1 0 .0 .0 .7 [W IN -D 39M R 5H L9E4]
Of Domain: WORKGROUP
#< - .t.
01 rescan,
click Clear.
8. If you are going to perform a new scan, die previous scan results are
erased.
Lab Analysis
Analyze and document die results related to die lab exercise.
T ool/U tility
N etB IO S
E num erator
Tool
Machine Name
NetBIOS Names
User Name
Domain
MAC Address
Round Trip Time (RTT)
Module 04 - Enumeration
0 No
Platform Supported
0 Classroom
C E H L ab M an u al Page 285
0 !Labs
Module 04 - Enumeration
KEY
[^ 7 Valuable
information
y
Test your
knowledge
Web exercise
Workbook review
Lab Scenario
To be an expert ethical hacker and penetration tester, you must have sound
knowledge of enumeration, which requires an active connection to the machine
being attacked. A hacker enumerates applications and banners 111 addition to
identifying user accounts and shared resources, hi this lab we try to resolve host
names and auto-detect vour local and external IP range.
Lab Objectives
The objective of this lab is to help students learn and perform NetBIOS
enumeration. NetBIOS enumeration is carried out to detect:
Hardware MAC addresses across routers
& Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 04
Enumeration
Lab Environment
To carry out the lab, you need:
SoftPerfect Network Scanner is located at
D:\CEH-Tools\CEHv8
Module 04 Enumeration\SNMP Enumeration T ools\SoftPerfect
Network Scanner
You can also download the latest version of SoftP erfect Network
Scanner from the link
http: / / www.sottpertect.com/products/networkscanner/
C E H L ab M an u al Page 286
Module 04 - Enumeration
111
Lab Duration
Tune: 5 A!unites
Overview of Enumeration
Enumeration involves an active connection so diat it can be logged. Typical
information diat attackers are looking for nicludes user account nam es for future
password-guessnig attacks.
Lab Task
E TASK 1
Enumerate
Network
L^J
y
Range From f g
IP Address
. 0 .0
.0
Host Name
| to |~ 0
MAC Address
* A
r j * *
0 . 0 . 0
I 3
Q (0 Web-site
f>
Start Scanning *
Response Time
SoftPerfect allows
you to mount shared
folders as network drives,
browse them using
Windows Explorer, and
filter the results list.
Ready
Threads
Devices
0 /0
Scan
3. To start scanning your network, enter an IP range 111 die Range From field
and click Start Scanning.
C E H L ab M an u al Page 287
Module 04 - Enumeration
0
0
1 -1
L3 H
Range From I
B
E0 . 0
. 0
to
10
. 50 a
Web-site
Start Scanning
II
Response Time
& Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 04
Enumeration
Ready_______________ Threads_______Devices
0 /0
4. The statu s bar displays the status ot the scamied IP addresses at die
bottom of die window.
>*j
| X fc* V IP A
Range From r 0 . 0
F Address
?
| To |
10
MAC Address
Response Tme
0!
0 ms
10.0.0.1
10.0.0.2
WIN-MSSELCK4...
-1...
ffl
10.0.0.3
WIN-ULY858KH...
0!
1-0...
1ms
, 10.0.0.5
WIN-LXQN3WR...
0!
S-6...
4 ms
ISA 10.0.0.6
ADMIN-PC
0'
1-0...
0 ms
e 10.0.0.7
WIN-039MR5H...
5-C...
0 ms
Igu 10.0.0.8
ADMIN
0!
t-0...
0 ms
1u 10.0.0.10
WIND0WS8
Ot
.8-6...
2 ms
. 50
Host Name
B
a
Q SoftPerfect Network
Scanner can also check for
a user-defined port and
report if one is open. It can
also resolve host names
and auto-detect your local
and external IP range. It
supports remote shutdown
and Wake-On-LAN.
Bookmarks Help
g J=l A
~| a
Web-site
IB Stop Scanning
jj
2ms
C E H L ab M an u al Page 288
Module 04 - Enumeration
R an g e From
B3
To
IP A ddress
ei
10 0 0.1
11
10.0.0.2
..
j 10.0.0.3
El eta 10.0.0.5
e u 10.0.0.6
s eb
eu
1 0 .0 .0 .7
..
10 0 0.8
eta 10.0.0.10
10
R esponse Tim e
0 ^ ^-2...
0m s
VVIN-MSSELCK4.. D
-l...
WIN-UL'f
Open
Computer
W IN -L X Q
2m s
>
A D M IN -P
Copy
W IN -D 39
Properties
A D M IN
50
MAC Address
Rescan Computer
W IN D O W
Wake-On-LAN
Remote Shutdown
Remote Suspend / Hibernate
Send Message...
Create Batch File...
Devices
8 /8
Lab Analysis
Analyze and document die results related to die lab exercise.
T ool/U tility
SoftPerfect
N etw ork
Scanner
Result:
IP Address
Host Names
MAC Address
Response Time
Questions
1. Examine die detection of die IP addresses and MAC addresses across
routers.
2. Evaluate die scans for listening ports and some UDP and SNMP services.
C E H L ab M an u al P ag e 289
Module 04 - Enumeration
0 No
Platform Supported
0 Classroom
C E H L ab M an u al Page 290
0 !Labs
Module 04 - Enumeration
Lab
KEY
/ Valuable
information
Test your
knowledge
Web exercise
m
Workbook review
Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 04
Enumeration
Lab Scenario
Penetration testing is much more than just running exploits against vulnerable
systems like we learned 111 the previous module. 111 fact a penetration test begins
before penetration testers have even made contact with die victim systems. Rather
dian blindly dirowing out exploits and praying diat one of them returns a shell,
penetration tester meticulously study the environment for potential weaknesses and
their mitigating factors. Bv the time a penetration tester runs an exploit, he or she is
nearly certain diat it will be successful. Since failed exploits can in some cases cause a
crash or even damage to a victim system, or at die very least make the victim 1111exploitable 111 the future, penetration testers won't get the best results. 111 tins lab we
enumerate target system services, accounts, hub ports, TCP/IP network, and routes.
You must have sound knowledge of enumeration, which requires an active
connection to the macliine being attacked. A hacker enumerates applications and
banners 111 addition to identifying user accounts and shared resources.
Lab Objectives
The objective of tins lab is to help students learn and perform NetBIOS
enumeration. NetBIOS enumeration is carried out to detect:
Hardware MAC addresses across routers
C E H L ab M an u al Page 291
Module 04 - Enumeration
Lab Environment
To earn out the lab, you need:
Run this tool 111 W indows Server 2012 Host machine and W indows
Server 2008 virtual machine
Lab Duration
Time: 5 Minutes
Overview of Enumeration
Enumeration involves an active connection so that it can be logged. Typical
information diat attackers are looking for includes user account nam es lor future
password guessing attacks.
Lab Task
W TASK 1
Enumerate
Network
4 *.S j 5
E3 Cut troubleshooting
time in half using the
Workspace Studio, which
puts the tools you need for
common situations at your
fingertips
B 3
f t Stiver
ShH Hardware Detect!:n
S^Smir Card
4 Smart Card Removal Policy
E SNMP Service
Oescnptior:
Lrvjfck: Smpk Network
4 SNMP Trap
Management Protocol (SNMP)
^ Software Protection
requests to be processed by this
^ Spccial Administration Comclr Hdpct
cornputer If this service 15stopped,
the computer will be unoble to
4 Spot Verifier
proem SNMP irquettt. If this servic. &SGI Full-text Filter Daemon launcher -.
k disabled, any services that explicit!)
* SQL Server (MSSQLSERVER)
depend on it will fail to start.
&SQL Server Agent (MSSQLSERVER)
S*,SQL Server Analyse Services (MSSQLS
SQL Server Browser
& SQL Server Distributed Replay CSert
6 SQL Server Distributed Replay Cortrcl S* SQL Server Integration Services 110
5* SQL Server Reporting Services (MSSQL Q SQL Server YSS Writer
SfcSSDP Discovery
Superfetch
& System Event Nctficaton Scrvicc
$ , Task Scheduler
S i TCP/IP NetBIOS Helper
Dcscnpton
Supports We, paProvide* notifica..
Manages k c i ! ! ..
A!lcss th systr..
Enafcks Simple...
Recedes trap m#_.
Enables the dow ..
A lcm admreit(..
Verifies potential..
Service to launch .
Provides stcrcge...
Executesjobs. m...
Supplies online a-.
Provides SQL Ser..
One or more Dist..
Provides trace re...
Provides manag..
Manages, execut..
Provides the inte..
Discover* rehvor.
Maintains end i .
Monitors system
Enables a user to..
Provides support..
Status
Running
Running
Running
Running
Running
Running
Running
Running
Running
Running
Running
Running
Startup type
Automatic
Automatic
Disabled
Manual
Automatic
Manual
Automatic (D...
Manual
Manual (Trig...
Manual
Automatic
Manual
Automatic
Disabled
Manual
Manual
Automatic
Automatic
Automatic
Disabled
Manual
Automatic
Automatic
Automatic (T.
Log On As
Local Syste...
Local Syne...
Local Servict
Local Syste ..
Local Syne.. 1
Local Service
Network S..
Local Syste...
Local Syste..
NT Service...
NT Service...
NT Scrvice..
NT Service...
Local Service
NT Service...
NT Service...
NT Service...
NT Service...
Local Syste..
Local Service
Local Syste..
Local Syste..
Local SysteLocal Service
\ Extended >vStandard /
Module 04 - Enumeration
Dependencies
Rights
Add...
Edit
Remove
IP Monitor and
alert in real tim e
on network
availability and
health with tools
including RealTime Interface
Monitor, SNMP
Real-Time Graph,
and Advanced
CPU Load
^1
Cancel
Community Name:
|public
Leam more about SNfflP
Cancel
OK
Apply
4.
Select A ccept SNMP packets from any host, and click OK.
SNMP Service Properties (Local Computer)
General
Log On
Recovery
Agent
raps |
| Z-epenaencies
OK
Cancel
Apply
Module 04 - Enumeration
6. Launch the Start menu by hovering the mouse cursor on the lower-left
corner of the desktop.
Start
Server
Manager
Administrator
Windows
PowerShel
Workspace
Studio
SQL Server
Installation
Center...
Command
Prompt
Mozilla
Firefox
ProxySwiL..
Standard
F3
<
IT
Computer
Control
Panel
Hyper-V
Manager
HyperV
Virtual
Machine...
IL
Internet Explorer
Google
Chrome
Global
Network
Inventory
II
1
ft
Nmap Zenmap
GUI
O
Module 04 - Enumeration
* "!
Tabs
Yiew
Devices
Interfaces
Gadgets
Help
External Tocls
Devices
r\r*
Getting Started *
O
V
x II
aa
!*
G e ttin g Started
SETTING UP WORKSPACE STUDIO COESTT HAVE TO BE SCARY
t TraceRoute
^ ^
EM]
Add Device
Cevices
Q j Recently tseo
Step 3 - Add tabs to create grojps cf gadgets 0* crganze then any way you wart.
I 0 of Cdev<*(s) selected
_ Stow QQUOrarres
| E>t::re
Gadgets
d Q
Mcn<o1ng
M ore Help
OTHER RC30URCC3 TO GCTYOU :
CllCPUandMerro'y
M em ory G a u g e s
MEMORY STATISTICS TOR ONE OR TWO HOSTS
- mI Interface CHait
ln!er?aee Gauge
<
Interface Table
.1.
>
TFTP Service
Clear
Status Running
[ l Tdb*
1^,
'
II
Id
Step 2 - Drag gadgets from the explorer at feft to this w3rt space and associate them with a device.
Sefcinas
Gadgets
7. Click External Tools, and then select Classic tools -> Network Discovery
-> IP Network Browser.
T=TO
Tabs
View
Devices
B Deploy an array o f
n etw ork discovery tools
including Port Scanner,
Switch Port Mapper, and
Advanced Subnet
Calculator.
Interfaces
uul
tj
Interface Chart
oe!tmg Started '
O
Groupby: GnupNan* *
Remote Dcsrtoo
C cttin g sL
SETTING JP /WORKSPACE STUDO DOESN'T HAVE TO
1., ^N e w To b
____________
in
Cisco Tools
IP Address Management
Network Monitoring
Step 2 - Drag gadgets frcm the explorer at le i tc this wort
] :
It*)
Ping Diagnostic
of Ddevee(s) seecte:
Starcro^raiies
10311a |
LdunchPad
Network Discovery
Devices
P 1Recently Jsed
Recently Used
DNS Audit
IP Address Management
IP Network Browser
Security
Etyr
SMMP Tools
Q
ti
jt J Monitoring
da
Port Scanner
SNMP Sweep
Subnet List
a i Interface Chart
"!
TFTP Service
Statu* Rjnning
gy
Clear
SHtma*
| Step ]
Gadgets
Module 04 - Enumeration
1ST
P SolarWinds
Toolset
applications use
several m ethods
to co llect data
about the health
and performance
of your network,
including ICMP,
SNMPv3, DNS and
Syslog. Toolset
does NOT require
deployment of
proprietary
agents,
appliances, or
garden gnom es
on the network.
IP Network Browser
t m % *
Nevr
Re *a rt
Export
Prin
Copy
Cop/
m 0 3 0 1^
Zoom
Stop
Ping
Telnet
Config
Trace
Surf
Settings
Help
IP Network Browser
Scan a S ingle D evice_________
3 3 '
Scan a S u bn et
jd
Subnet Address
Scan Suhnel
Subnet Mask
1255.255.255.0
Scan an IP A d d re s s R anqe
Dcgining IP Addicss
tnding IP Addtess
9. It will show die result 111 a line widi die IP address and name ot die
computer diat is being scanned.
10. Now click the Plus (+) sign before die IP address.
File Edit
& NetFlow
Realtime is
intended for
granular, real-time
troubleshooting
and analysis of
NetFlow sta tistics
on single
interface and is
limited to a 1 hour
capture
NeA
1 -
Restart
MBs
Discovery
y m
E>port
Subnet
4
Copy
View
%
Copy
*
Zoom
Stop
Ping
1
Telnet
Trace
@
Confg
e
Surf
rf
Setting:
Help
nA
4 V ^
<
oV
A o V
.o
\0 ,A /
W
Help
\|
o
v<y
r J?
> >*
/ /
j&
< & */
J
4
Y
eV
V -V*
./
( IS *
AU
3 / \
r r
*
J ?
&
Module 04 - Enumeration
- *
Node*
MlBs
Export
Discovery
Subnet
Copy
View
Help
* 0} s
Copy
Stop
Zoom
Ping
Telnet
Tra<
'
& sf
Config
Surf
Setting!
ST
Jj Ss3ten Naxie: WDI-D39MP5HL9E4
J Description; Harcware: Intel64 Family 6Hcdel 42 . -eppinc 7 AI/&TCCMPAIIBLI - Softwar! : Windows V e rsio n
qp
Ti
a t !- .:
4^
JJ sysOb;crD: 1.3.6.r.4.1.311.r.1.3.1.2
Is*
0 Last Boot: 9/5/2012 9:13:49 AM
Router ( w ill fsrvard IF packets ?) : No
vO%
Adirinittritor
C Gueas
S.2 (B u ild 6
f i UM5*JAaC.ll USSR
A tn a
O'
Shared Dilnttn
<!
TC9/ZF Networks
IPX hetworic
E ^ 0 .0 .9 .0
<$>:0.0 0 0
255 a
S
ti:
S
E
255.255
255.255
3> 1 0 .0 .0 .7
10.0.0.26S
^ 1 2 7.0.0 .0
^ 1 2 7.0.0 .1
<$> 127.266.356.266
<
A o .V
si? A>
J?
K%^
4C*
a rV*
'S> \
Lab Analysis
Analyze and document die results related to die lab exercise.
Tool/Utility
SolarWinds Tool
Set
Interfaces
Services
Accounts
Shares
Hub Ports
T C P/IP Network
IPX Network
Routes
Questions
1. Analyze the details of die system such as user accounts, system MSI,
hub ports, etc.
Module 04 - Enumeration
0 No
Platform Supported
0 Classroom
C E H L ab M an u al Page 298
0 !Labs
Module 04 - Enumeration
Lab Scenario
/ Valuable
information
Web exercise
Q Workbook review
Lab Objectives
The objective of this lab is to help suidents learn and perform network
enumeration:
Users information 111 the system
Services running 111 the system
& Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 04
Enumeration
C E H L ab M an u al Page 299
Lab Environment
To perform the lab, you need:
A computer ranning Windows Server 2012
Administrative privileges to install and run tools
You can also download tins tool from following link
http: / / www. systemtools.com/livena/download.litm
E th ical H a ck in g a nd C ounterm easures Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 04 - Enumeration
If you decided to download latest version of tins tool screenshots may differ
Lab Duration
Time: 10 Minutes
Overview of Enumeration
Enumeration is die process of extracting user names, machine names, network
resources, shares, and sendees from a system. Enumeration techniques are
conducted 111 an intranet environment
Lab Tasks
The basic idea 111 diis section is to:
1.
E
t a s k
Installation of
Hyena
ca
/ u n v 1v . s y s t e m t o o l s . c o m
h y e n a / h y e n a _ n e 1v . h t m
3.
The Softw are L icen se A greem ent window appears, you must accept
the agreement to install Hyena.
4.
Module 04 - Enumeration
5.
6.
In addition to
supporting standard
Windows system
management functions,
Hyena also includes
extensive Active Directory
integration
Change...
7.
Module 04 - Enumeration
R e a d y to In s ta ll th e P ro g ra m
The wizard is ready to begin installatic
8.
In s ta llS h ie ld W iz a r d C o m p le te
T he InstallShield W iza rd has s u c c e s s fu l insta le d H yena v9.0. C lick Finish to exit the wizard.
Enumerating
system
Information
9.
Launch the Start menu by hovering the mouse cursor on the lowerleft corner of the desktop.
Module 04 - Enumeration
10.
Module 04 - Enumeration
Hyena v9.0
J
He
Edit
Wew
Tools
cygSU
Drives
4 C
Guest
Jason (Jason)
a a 11
Hyena v9.0
J u g g y b o y (Juggyboy)
Martin (Martin)
A dm inistrator
4 C
&
Help
Shiela (Shiela)
J 1 Local Groups
>'
Printers
Shares
S essio n s
&
O p en Files
Services
g p D evices
ffi 4 >Events
9
'
j
I
c a Additional
com m and-line options
were added to allow
starting Hyena and
automatically inserting
and selecting/ expanding
a dom ain, server, or
com puter.
Disk Sp ace
User Rights
P erform ance
, a
:
S c h ed u led Jobs
Registry
WMI
+ ^
Enterprise
6 user(s) fo u n d o n ,\\W1N-D39MR5HL9E4'
14. To check the services running on the system, double-click S erv ices
Hyena v9.0 Services on WWIN-D39MR5HL9E4
Re
Ed
Wew
Toots
Help
Drives
&
Local C o n n ec tio n s
a
Services on WWIN-D39MR5HL9E4
Users
.
A dm inistrator
$ 5 AdobeA R M service
A d ob e A crobat Up...
Running
A eL ookupSvc
A pp lication Experie...
Stop ped
ALG
Stop ped
Stop ped
A ppH ostSvc
Running
ApplDSvc
A pp lication Identity
Stop ped
Printers
A ppinfo
A pp lication Inform...
Stop ped
Shares
$ 5 A ppM gm t
A pp lication M anag...
Running
S " Sessions
A udioEndpointB ...
W in dow s A ud io En...
Stop ped
iLJ Q penhles
A udiosrv
W in dow s A udio
Stop ped
BFE
R unning
0 BITS
B ackground Intellig...
R unning
Brokerlnfrastruct...
R unning
Disk Sp ace
Browser
C om p uter Browser
Stop ped
S S
User Rights
CertPropSvc
C ertificate Propaga...
Stop ped
* 9
P erform ance
C O M S y sA p p
Stop ped
S c h ed u led Jobs
Ocrypt^vc
C ryptographic Servi...
Running
D com L au nch
R unning
defragsvc
Stop ped
D eviceA ssociatio...
Stop ped
Guest
Jason (Jason)
J ug g y b o y (Juggyboy)
Martin (Martin)
Shiela (Shiela)
5
g ^
ffi Q
Local Groups
U&fZEELl
2 P D evices
BE d L Events
O
Registry
i &
^
WMI
Enterpnse
Module 04 - Enumeration
' r *
VtcH
Edt
Tools
y *3 a X
*
Hdp
3* :::
Martin (Martin)
Shiela (Shiela)
5=] Q
fl J
SI
Server
Shares
S S e ssio n s
j^
fe E3
3 Drives on \\WIN-D39MR5HL9E4
Local Groups
Pnnters
+ ^
3 a i
Ju g g y b o y (Juggyboy)
O p en Files
Drive
Form at
Total
U sed
W 1N -D 39M R ... C
NTFS
97.31 GB
87.15 GB
W 1N -D 39M R ... D
NTFS
97.66 GB
2.90 GB
W IN -D 3 9 M R ... E
NTFS
270.45 GB
1.70 GB
Q b Services
Devices
ffi &
^
Events
Disk Sp ace
g h ts I
f t Backup Operators
Users
A dm inistrators 3 1 (
Everyone
SeTcbP rivilege (Act as part of th e opera
S eM ach m eA ccou ntP rivilege (Add work &
St SeBackupPrivilege (Back up files and dii-,
i L S eC han geN otifyPrivilege (Bypass traver
SeU nsolicitedln pu tPrivilege (Selln solicii ^
S eSystem tim eP rivilege (C h ange th e sys - |
- SeC reateP agefileP rivilege (Create a pag
21
:a
3 Drives o n "WW1N-D39MR5HL9E41
^^^biects
Wew
Tools
Help
y *3< x 3 :: |e| o 1$
ft C
J u g g y b o y (Juggyboy)
Martin (Martin)
Shiela (Shiela)
Local Groups
& ^
Printers
S'
1 Shares
S essio n s
O p en Files
9
Services
2 P D evices
f f i - A Events
^
A j .3;j r b
a a [Ho
Disk S p ace
N am e
Status
Trigger Type
0 W IN -D 3 9 M R ... CCIeanerSkipUAC
Ready
Ready
M ultiple Trigc
0 W IN -D 3 9 M R ...
Ready
Daily
0 W IN -D 3 9 M R ...
Daily
0 W IN -D 3 9 M R ...
Daily
5 ]W IN -D 39M R ...
Ready
On Idle
0 W IN -D 3 9 M R ...
Ready
Ready
E B
D isabled
M ultiple Trigc
Ready
At Log on
P erform ance
M icrosoft
0 W IN -D 3 9 M R ...
W in dow s
; ^
ffi @
:
0 W IN -D 3 9 M R ...
Sm artScreenSpecific
Ready
At Log on
S]WIN-D39MR...
V enfiedPublisherCertSto...
D isabled
At Startup
Ready
Ready
0 W IN -D 3 9 M R ... StartupAppTask
Ready
Ready
AppID
A pplicationD ata
jL<9 A utoch k
- 3 CertificateServicesClient
EB US Chkdsk
ffi ^
D isabled
.NET Framework
I A pp lication Experience
P olicyC onverter
0 W IN -D 3 9 M R ...
Proxy
Ready
At Startup
0 W IN -D 3 9 M R ...
System T ask
Ready
M ultiple Trigc
0 W IN -D 3 9 M R ...
UserTask
Ready
M ultiple Trigc
Lab Analysis
Analyze and document the results related to die lab exercise. Give your opinion on
your targets security posture and exposure.
Module 04 - Enumeration
Tool/Utility
H yena
Local Connections
Users
Local Group
Shares
Shares
Sessions
Services
Events
User Rights
Performance
Registry
mn
0 No
Platform Supported
0 Classroom
C E H L ab M an u al Page 306
0 !Labs