SlideShare a Scribd company logo
Enumeration and
System Hacking
Enumeration
• Defined as an in-depth analysis of targeted device
• Performed by connecting systems to identify user
accounts, system accounts, services and system details
• Process of proactively querying or connecting with target
system in order to elicit information on NetBIOS/LDAP,
SNMP, UNIX/Linux operation, NTP Servers, SMTP Servers
and DNS Servers.
Windows
Enumeration
• Intent of windows enumeration is to recognise user
account and system account that can be for potential use.
• Ethical hacker should aim to collate basic knowledge from
an system administer perspective
• Understanding of Microsoft Client systems and Server is
essential with regards to Windows 7, 8 and 10.
• Kernal is considered an essential and trusted part of the
operating system.
• Operating systems within Microsoft implement rings of
protection when evaluating which component to trust
• The protection ring model maintains levels of access and
granularity
Example of
Protective
Rings Model
• The example model of the Windows Architecture
evidently depicts the User mode (ring 3) and kernel mode
(ring 0). Restrictions are contained within the User mode
whereas the Kernel mode permits full access of all
resources
• Ethical hacker must be aware most antivirus and analysis
tools have the functional capability of identifying hacking
tools and code which operate within the user mode.
• Ethical hacker must have awareness in the event if a code
is implemented within the realms of the windows system
and executed in the kernel mode, the code by large can
disguise itself within the user mode detection and will
remain harder to identify.
• The intent of the Hacker is always to execute code within
the highest privilege levels
• Windows implements the following types of identifies in
order to maintain trace of all user security rights and
identity:
1. Security Identifiers (SID)
2. Relative Identifiers (RID)
• SID can be depicted as a data structure of variable length
which aims to identify user, group and computer
accounts.
• RID is a portion element of SID which aims to recognise a
user or group in relation to the authority that user has.
System
Hacking
• Scope of system hacking typically entails attempting to
gain access
• Intent of system hacking is to authenticate to the remote
host with the highest level of access.
• Authentication systems can experience non technical and
technical password attacks
Nontechnical
Password
Attacks
The following are the types of non technical attacks
employed by hackers:
• Dumpster Diving
• Social Engineering
• Shoulder Surfing
Technical
Password
Attacks
Tools used during enumeration typically entail Hyena,
Network Performance Monitor, Nbstat.
The following password attack techniques comprise of the
following:
1. Password Guessing
2. Automated password guessing
3. Password sniffing
4. Keylogging
1.Password
Guessing
• Documentation should be maintained for all penetration
tests and previous activities
• Password guessing successful due to people using easy to
remember words and phrases
• Tools and online passwords and pwned password
repositories exist that can be implemented to identify
breached passwords
• Recon-ng is a full-featured reconnaissance tool that
features a pwned lookup.
Automated
Password
Guessing
• Popular free tools such as Brutus and THC Hydra can be
implemented to automate password guessing.
Password
Sniffing
• Sniffing and Keystroke loggers can offer the potential possibility
to guess passwords
• The scope of password sniffing entails having physical or logical
access to the device
• Techniques such as Passing the Hash permits Hacker to
authenticate to remote server by implementing the NTLM or
LM hash of a user’s password in contrary to implementing the
relevant password in the form of plaintext
Privilege
Escalation and
Exploiting
Vulnerabilities
• Standard User Accounts are based on a limited privilege and
do not provide privilege escalation and full control to the
hacker
• Only in the victim system can the Hackers execute privilege
escalation tools
• Common techniques comprise of the following which can aid
the hacker in using the victim system to exploit a vulnerability:
1. Manipulating OS or the application
2. Manipulating the user to accepting to execute the
program
3. Enforcing the copying of the privilege escalation tool
within the targeted system and implementing
timescales to execute the exploit
4. Exploiting interactive access into systems such as
Terminal Services Web Access (TS Web Access) ,
Microsoft Remote Desktop, Bomgar etc
UK - Cyber Defence Academy
• Specialist provider in bespoke classroom, online and self learning
cyber security and cyber defence training.
• Visit us on : www.tech-strategygroup.com
• Empower your employees to become aware about cyber security
• Implement bespoke cyber security training programmes for your
employees in alignment to your cyber security strategy,
transformation programmes and projects.
• For more information e-mail us on: info@tech-strategygroup.com

More Related Content

PPTX
Password Attack
PPTX
EDR(End Point Detection And Response).pptx
PPTX
Android Device Hardening
PPT
IDS and IPS
PPTX
Intrusion detection
 
PPT
Ch07 Access Control Fundamentals
PPTX
Password Policy and Account Lockout Policies
PPTX
DoS or DDoS attack
Password Attack
EDR(End Point Detection And Response).pptx
Android Device Hardening
IDS and IPS
Intrusion detection
 
Ch07 Access Control Fundamentals
Password Policy and Account Lockout Policies
DoS or DDoS attack

What's hot (20)

PPTX
Brute force-attack presentation
PPT
Browser Security
PPTX
Firewalls
PDF
Local File Inclusion to Remote Code Execution
PPTX
Systems Administration
PPTX
Six Degrees of Domain Admin - BloodHound at DEF CON 24
PPTX
Introduction To Ethical Hacking
PDF
Ch 10: Hacking Web Servers
PPT
Malware Analysis Made Simple
PPTX
Vulnerabilities in modern web applications
PDF
Penetration testing
PPTX
Firewall and Types of firewall
PPT
PPTX
Physical security
PDF
Web Application Penetration Testing
PPTX
Internet security
PPTX
Malware Static Analysis
PPTX
Bug Bounty 101
PPTX
Malware analysis
PPTX
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Brute force-attack presentation
Browser Security
Firewalls
Local File Inclusion to Remote Code Execution
Systems Administration
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Introduction To Ethical Hacking
Ch 10: Hacking Web Servers
Malware Analysis Made Simple
Vulnerabilities in modern web applications
Penetration testing
Firewall and Types of firewall
Physical security
Web Application Penetration Testing
Internet security
Malware Static Analysis
Bug Bounty 101
Malware analysis
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg

Similar to Enumeration and system hacking (20)

PDF
Ch11 NetSec5e_Intruders and intruderssss
PPTX
module 3 of cybersecurity of first year students
PPT
Chapter Last.ppt
PDF
BAIT1103 Chapter 7
PPTX
Network security and firewalls
PDF
Computer security
PPTX
Computer Security Primer - Eric Vanderburg - JURINNOV
PPTX
Introduction to cyber security
PPTX
Cyber Security # Lec 5
PPTX
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
PPTX
attack vectors by chimwemwe.pptx
PPTX
Ethical Hacking justvamshi .pptx
PPTX
Ch1 Cryptography network security slides.pptx
PPTX
7 Ways To Cyberattack And Hack Azure
PPTX
Intruders in cns. Various intrusion detection and prevention technique.pptx
PPT
Information Security Audit and Analysis Module
PPTX
Lecture 10 intruders
PPTX
Cyber Security # Lec 2
PPT
Network security and protocols
PPTX
Computer , Internet and physical security.
Ch11 NetSec5e_Intruders and intruderssss
module 3 of cybersecurity of first year students
Chapter Last.ppt
BAIT1103 Chapter 7
Network security and firewalls
Computer security
Computer Security Primer - Eric Vanderburg - JURINNOV
Introduction to cyber security
Cyber Security # Lec 5
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
attack vectors by chimwemwe.pptx
Ethical Hacking justvamshi .pptx
Ch1 Cryptography network security slides.pptx
7 Ways To Cyberattack And Hack Azure
Intruders in cns. Various intrusion detection and prevention technique.pptx
Information Security Audit and Analysis Module
Lecture 10 intruders
Cyber Security # Lec 2
Network security and protocols
Computer , Internet and physical security.

More from begmohsin (7)

PPTX
Skills you need to become a ethical hacker
PPTX
Attackers process
PPTX
How hackers collate information about employees
PPTX
Types of hackers
PPTX
Ethical System Hacking- Cyber Training Diploma
PPTX
Ethical Hacking Tools & Techniques
PPTX
Defend your organisation from Cyber Attacks
Skills you need to become a ethical hacker
Attackers process
How hackers collate information about employees
Types of hackers
Ethical System Hacking- Cyber Training Diploma
Ethical Hacking Tools & Techniques
Defend your organisation from Cyber Attacks

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Sports Quiz easy sports quiz sports quiz
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Classroom Observation Tools for Teachers
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Pharma ospi slides which help in ospi learning
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Computing-Curriculum for Schools in Ghana
human mycosis Human fungal infections are called human mycosis..pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Sports Quiz easy sports quiz sports quiz
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial disease of the cardiovascular and lymphatic systems
master seminar digital applications in india
Pre independence Education in Inndia.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Types and Its function , kingdom of life
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Classroom Observation Tools for Teachers
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Pharma ospi slides which help in ospi learning
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
FourierSeries-QuestionsWithAnswers(Part-A).pdf

Enumeration and system hacking

  • 2. Enumeration • Defined as an in-depth analysis of targeted device • Performed by connecting systems to identify user accounts, system accounts, services and system details • Process of proactively querying or connecting with target system in order to elicit information on NetBIOS/LDAP, SNMP, UNIX/Linux operation, NTP Servers, SMTP Servers and DNS Servers.
  • 3. Windows Enumeration • Intent of windows enumeration is to recognise user account and system account that can be for potential use. • Ethical hacker should aim to collate basic knowledge from an system administer perspective • Understanding of Microsoft Client systems and Server is essential with regards to Windows 7, 8 and 10. • Kernal is considered an essential and trusted part of the operating system. • Operating systems within Microsoft implement rings of protection when evaluating which component to trust • The protection ring model maintains levels of access and granularity
  • 5. • The example model of the Windows Architecture evidently depicts the User mode (ring 3) and kernel mode (ring 0). Restrictions are contained within the User mode whereas the Kernel mode permits full access of all resources • Ethical hacker must be aware most antivirus and analysis tools have the functional capability of identifying hacking tools and code which operate within the user mode. • Ethical hacker must have awareness in the event if a code is implemented within the realms of the windows system and executed in the kernel mode, the code by large can disguise itself within the user mode detection and will remain harder to identify. • The intent of the Hacker is always to execute code within the highest privilege levels • Windows implements the following types of identifies in order to maintain trace of all user security rights and identity: 1. Security Identifiers (SID) 2. Relative Identifiers (RID)
  • 6. • SID can be depicted as a data structure of variable length which aims to identify user, group and computer accounts. • RID is a portion element of SID which aims to recognise a user or group in relation to the authority that user has.
  • 7. System Hacking • Scope of system hacking typically entails attempting to gain access • Intent of system hacking is to authenticate to the remote host with the highest level of access. • Authentication systems can experience non technical and technical password attacks
  • 8. Nontechnical Password Attacks The following are the types of non technical attacks employed by hackers: • Dumpster Diving • Social Engineering • Shoulder Surfing
  • 9. Technical Password Attacks Tools used during enumeration typically entail Hyena, Network Performance Monitor, Nbstat. The following password attack techniques comprise of the following: 1. Password Guessing 2. Automated password guessing 3. Password sniffing 4. Keylogging
  • 10. 1.Password Guessing • Documentation should be maintained for all penetration tests and previous activities • Password guessing successful due to people using easy to remember words and phrases • Tools and online passwords and pwned password repositories exist that can be implemented to identify breached passwords • Recon-ng is a full-featured reconnaissance tool that features a pwned lookup.
  • 11. Automated Password Guessing • Popular free tools such as Brutus and THC Hydra can be implemented to automate password guessing.
  • 12. Password Sniffing • Sniffing and Keystroke loggers can offer the potential possibility to guess passwords • The scope of password sniffing entails having physical or logical access to the device • Techniques such as Passing the Hash permits Hacker to authenticate to remote server by implementing the NTLM or LM hash of a user’s password in contrary to implementing the relevant password in the form of plaintext
  • 13. Privilege Escalation and Exploiting Vulnerabilities • Standard User Accounts are based on a limited privilege and do not provide privilege escalation and full control to the hacker • Only in the victim system can the Hackers execute privilege escalation tools
  • 14. • Common techniques comprise of the following which can aid the hacker in using the victim system to exploit a vulnerability: 1. Manipulating OS or the application 2. Manipulating the user to accepting to execute the program 3. Enforcing the copying of the privilege escalation tool within the targeted system and implementing timescales to execute the exploit 4. Exploiting interactive access into systems such as Terminal Services Web Access (TS Web Access) , Microsoft Remote Desktop, Bomgar etc
  • 15. UK - Cyber Defence Academy • Specialist provider in bespoke classroom, online and self learning cyber security and cyber defence training. • Visit us on : www.tech-strategygroup.com • Empower your employees to become aware about cyber security • Implement bespoke cyber security training programmes for your employees in alignment to your cyber security strategy, transformation programmes and projects. • For more information e-mail us on: info@tech-strategygroup.com