1 00:00:12,820 --> 00:00:19,870 In the last lecture, we saw an introduction to an numeration in this lecture, we will see two types 2 00:00:19,870 --> 00:00:20,740 of enumeration. 3 00:00:20,980 --> 00:00:23,710 The first is netball's and numeration. 4 00:00:23,860 --> 00:00:27,280 Netball's is a unique 16 ASCII character. 5 00:00:27,280 --> 00:00:34,900 String used to identify the network devices over TCP IP 15 characters are used for the device name and 6 00:00:34,900 --> 00:00:37,930 the 16 character is reserved for the service on name. 7 00:00:37,930 --> 00:00:45,190 Record type attackers use the networks and numeration Gupton list of computers that belong to the domain 8 00:00:46,060 --> 00:00:51,040 list of shares on the individual who's in the network policies and passwords. 9 00:00:51,040 --> 00:00:58,090 And that utility in Windows displays netbacks over TCP IP protocol statistics networks name tables for 10 00:00:58,090 --> 00:01:01,990 both local and remote computers and the net name Cachets. 11 00:01:02,260 --> 00:01:08,410 Haina shows shares and user login names for Windows servers and domain controls. 12 00:01:08,980 --> 00:01:16,570 It displays graphical representation of Microsoft Terminal Services, Microsoft Windows Network, Bigland 13 00:01:16,570 --> 00:01:17,390 and many more. 14 00:01:17,800 --> 00:01:24,750 Next is the S&P and Numeration S and P stands for Simple Network Management Protocol. 15 00:01:25,540 --> 00:01:31,360 As an MP and numeration is a process of enumerating user accounts and devices on a target system. 16 00:01:31,540 --> 00:01:37,030 Using an MP as an MP consists of a manager and an agent. 17 00:01:37,630 --> 00:01:44,850 Agents are embedded on every network device and the manager is installed on a separate computer as an 18 00:01:44,850 --> 00:01:51,190 MP holds two passwords to access and configure that as an invasion from the management station to password 19 00:01:51,200 --> 00:01:52,980 to read community string. 20 00:01:53,590 --> 00:01:55,240 It is public by default. 21 00:01:55,510 --> 00:02:00,310 It allows the weaving of device configuration and rerate community stream. 22 00:02:00,670 --> 00:02:04,720 It is private by default and allows remote editing of configuration. 23 00:02:05,730 --> 00:02:12,810 Attackers used his default community strings to extract information about the device attackers enumerated 24 00:02:12,810 --> 00:02:20,250 as an attempt to extract information about network resources such as hosts, doubter's devices, shares 25 00:02:20,250 --> 00:02:27,210 and minimal network information such as ERP tables, routing tables, traffic information is obtained 26 00:02:27,210 --> 00:02:29,100 through S&P and numeration. 27 00:02:29,370 --> 00:02:37,260 So how to avoid as an MP and numeration removed as an agent or turn off the essential services on your 28 00:02:37,260 --> 00:02:37,830 computer? 29 00:02:38,580 --> 00:02:42,680 If shutting of the S&P is not an option, then change the default community. 30 00:02:42,690 --> 00:02:48,150 String names upgrade to S&P three, which includes passwords and messages. 31 00:02:48,690 --> 00:02:51,680 Implement the policy security option CORELESS. 32 00:02:51,690 --> 00:02:54,270 The additional restrictions for anonymous connections. 33 00:02:54,960 --> 00:03:01,160 Ensure that the access to decision pipes, television sets and IP filtering is restricted. 34 00:03:01,860 --> 00:03:06,270 Also disable the danger zone transfer to untested hosts. 35 00:03:06,810 --> 00:03:10,650 In the next video, we'll start with the practicals on an numeration. 36 00:03:11,040 --> 00:03:14,550 The first spectacle is a numeration using super scan.