1 00:00:13,500 --> 00:00:19,570 In the last lecture, we saw how to scan the network using a map in this lecture. 2 00:00:19,740 --> 00:00:21,450 We will start with and numeration. 3 00:00:22,530 --> 00:00:29,310 So what is a numeration network and numeration is the technique used to look closely or monitor minutely 4 00:00:29,310 --> 00:00:30,810 the network set on a computer? 5 00:00:31,680 --> 00:00:34,860 It is a technique used to check the pulse occupied by the network. 6 00:00:35,400 --> 00:00:38,940 It is generally a security technique used by the ethical hackers. 7 00:00:39,600 --> 00:00:44,760 With the help of network and numeration, vulnerabilities can be discovered, which can be then used 8 00:00:44,760 --> 00:00:49,230 by the network analysts, security analysts to fix the vulnerabilities in the system. 9 00:00:49,740 --> 00:00:56,340 And the numeration face attacker creates active connections with the system and performs directed queries 10 00:00:56,340 --> 00:00:58,590 to gain more information about the target. 11 00:00:59,430 --> 00:01:06,000 Attackers then use the extracted information to identify points of system attack and perform password 12 00:01:06,000 --> 00:01:09,390 attacks to gain unauthorized access to information system. 13 00:01:09,400 --> 00:01:14,730 Resources and numeration techniques are conducted in an Internet environment. 14 00:01:15,030 --> 00:01:22,230 Information enumerated by intruders are network resources, network shares, routing tables, audits 15 00:01:22,230 --> 00:01:29,770 and services as an MP and executing details what she names users and groups, applications and banners. 16 00:01:30,420 --> 00:01:32,460 So what are the results of an numeration? 17 00:01:33,600 --> 00:01:41,930 Extract usernames using email I.D., extract information using default passwords, brute force active 18 00:01:42,000 --> 00:01:42,720 directories. 19 00:01:43,790 --> 00:01:52,040 Extract user groups from windows, extract information using DNS, soon, transfer and extract user 20 00:01:52,040 --> 00:01:55,490 names using as an MP during a numeration. 21 00:01:55,700 --> 00:02:00,380 Information is systematically collected and individual systems are identified. 22 00:02:00,800 --> 00:02:04,350 The pentathletes examine the systems in their entirety. 23 00:02:05,000 --> 00:02:09,290 This allows them to evaluate security weaknesses in numeration. 24 00:02:09,740 --> 00:02:15,890 The experts extract the information of netball's information, user and group accounts, network shares, 25 00:02:16,190 --> 00:02:19,670 trusted domains and services which are either running or stopped. 26 00:02:19,770 --> 00:02:26,510 Well, the soopers can detect open TCP and UDP puts on a target machine and determines which services 27 00:02:26,510 --> 00:02:27,570 are running on those ports. 28 00:02:27,770 --> 00:02:31,310 We will see Superscreen practical in the next video. 29 00:02:32,030 --> 00:02:38,270 As an expert at the Gallagher and Pondexter, you need to enumerate target networks and extract lists 30 00:02:38,270 --> 00:02:44,570 of computers, user names, user groups, machine names, network resources and services using various 31 00:02:44,570 --> 00:02:45,700 enumeration techniques. 32 00:02:46,550 --> 00:02:50,810 So in the next lecture we will see types of enumeration.