Hacking Module 04
Hacking Module 04
Hacking Module 04
2008 Batch-I
Module IV
Enumeration
Scenario
It was a rainy day and Jack was getting bored sitting at home. He
wanted to be engaged in something rather than gazing at the
sky. Jack had heard about enumerating user accounts and
other important system information using Null Sessions. He
wanted to try what he had learned in his information security
class. From his friends he had come to know that the
university website had a flaw that allowed anonymous users to
log in.
Jack installed an application which used Null Sessions to
enumerate systems. He tried out the application and to his
surprise discovered information about the system where the
webserver was hosted.
What started in good fun became very serious. Jack started
having some devilish thoughts after seeing the vulnerability.
What can Jack do with the gathered information?
Can he wreak havoc?
What if Jack had enumerated a vulnerable system meant for
online trading?
Module Objectives
Source: http://ntsecurity.nu/toolbox/winfo/
Tool: NAT
Source: http://www.rhino9.com
Null Session Countermeasure
Null sessions require access to TCP ports 139
and/or 445.
You could also disable SMB services entirely on
individual hosts by unbinding the TCP/IP WINS
Client from the interface.
Edit the registry to restrict the anonymous user.
• 1. Open regedt32, navigate to
HKLM\SYSTEM\CurrentControlSet\LSA
• 2. Choose edit | add value
• value name: RestrictAnonymous
• Data Type: REG_WORD
• Value: 2
NetBIOS Enumeration
It
is a set of Network
Management Tools.
The tool set consists of
the following:
• Discovery
• Cisco Tools
• Ping Tools
• Address Management
• Monitoring
• MIB Browser
• Security
• Miscellaneous
Source: http://www.solarwinds.net/
Tool: Enum
It is a Windows based
SNMP scanner that can
effectively detect SNMP
enabled devices on the
network.
Itscans specific SNMP
ports and uses public, and
user defined, SNMP
community names.
Itis handy as a tool for
information gathering.
Source: http://www.foundstone.com
SNMPutil example
SNMP Enumeration Countermeasures
DumpReg is a tool to
dump the Windows NT and
Windows 95 Registry.
Main aim is to find keys
and values matching a
string.
Source: http://www.systemtools.com/
Tool: Trout
Trout is a combination of
Traceroute and Whois.
Pinging can be set to a
controllable rate.
The Whois lookup can be
used to identify the hosts
discovered.
Source: http://www.foundstone.com/
Tool: Winfingerprint
Winfingerprint is a GUI-
based tool that has the
option of scanning a single
host or a continuous
network block.
Has two main windows:
• IP address range
• Windows options
Source: http://winfingerprint.sourceforge.net
Tool: PsTools