Summary

In this chapter, we discussed the target enumeration process and its purpose. We also discussed port scanning as one of the target enumeration methods. You learned about several types of port scanning, and then we looked at several tools, such as Nmap, Unicornscan, and Amap. Next, we talked about SMB enumeration using nbtscan and SNMP enumeration, using onesixtyone and snmpcheck. Lastly, we talked about VPN enumeration and ike-scan as the tool to carry out this process.

In the next chapter, we will look at vulnerability identification, a process of identifying and analyzing the critical security flaws in the target environment.

Get Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.