Most netbios enumeration tools connect to the target system by using which of the following?

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and performs directed queries to gain more information about the target. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.

Types of information enumerated by intruders:

  • Network Resource and shares

  • Users and Groups

  • Routing tables

  • Auditing and Service settings

  • Machine names

  • Applications and banners

  • SNMP and DNS details

Techniques for Enumeration

  • Extracting user names using email ID's

  • Extract information using the default password

  • Brute Force Active Directory

  • Extract user names using SNMP

  • Extract user groups from Windows

  • Extract information using DNS Zone transfer

Services and Port to Enumerate

  • TCP 53: DNS Zone transfer

  • TCP 135: Microsoft RPC Endpoint Mapper

  • TCP 137: NetBIOS Name Service

  • TCP 139: NetBIOS session Service (SMB over NetBIOS)

  • TCP 445: SMB over TCP (Direct Host)

  • UDP 161: SNMP

  • TCP/UDP 389: LDAP

  • TCP/UDP 3368: Global Catalog Service

  • TCP 25: Simple Mail Transfer Protocol (SMTP)

Which of the following is a popular network management service for network administrators?

Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?

Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?

Which of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

Security testers conduct enumeration for which of the following reasons?

Gaining access to shares and network resources
Obtaining user logon names and group memberships

Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas?

The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions.

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts?

Which of the following testing processes is the most intrusive?

Which of the following tools can be used to enumerate Windows systems?

Most NetBIOS enumeration tools connect to the target system by using which of the following?

A null session is enabled by default in all the following Windows versions except:

What version of Windows Server has completely eliminated the option for the telnet server?

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

Which of the following is the vulnerability scanner from which OpenVAS was developed?

If you don't have access to Nessus, which of the following can be used by an attacker to gain information about remote *nix Hosts?

What enumeration tool is exteremly useful when working with Windows NT, 2000, and Windows XP systems?

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?

Which of the follwoing commands should you use to determine whether there are any shared resources on aWinodws computer with the IP address 193.145.83.202?

nbtstat -a 193.145.85.202

The computer names you assign to Windows systems are called which of the following?

What upper-level service is required to utilize file and printer sharing in Windows?

The open-source is descendant of Nessus is called which of the following?

A NetBIOS name does not need to be unique on a network.

What does the "NBT" part of "NBTscan" stand for?

What type of Windows Server is the most likely server to be targeted by a computer hacker?

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?

The Windows Net use command is a quick way to discover any shared resources on a computer or server. True of False?

Windows Server 2012 introducted what protection feature to prevent pass-the-hash attacks?

Which of the following is a commonly used UNIX enumeration tool?

To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use?

Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?

Which port numbers indicate NetBIOS is in use on a remote Target?

Enumeration of Windows systems can be more difficult if which port is filtered?

A NetBIOS name can contain a maximum of how many characters?

The nbtstat command is used to enumerate *nix systems. True of False?

Which port numbers indicate NetBIOS is in use on a remote target?

NetBIOS software runs on port 139 on the Windows operating system.

Which of the following is a utility for enumerating NetBIOS shares?

SuperScan is a NetBIOS enumeration tool.

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address?

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145. 85.202? The Windows Net use command is a quick way to discover any shared resources on a computer or server.

What tool can be used to read and write data to ports over a network?

A port scanner sends a network request to connect to a specific TCP or UDP port on a computer and records the response.