Skip to content

Latest commit

Β 

History

History
86 lines (53 loc) Β· 5.02 KB

File metadata and controls

86 lines (53 loc) Β· 5.02 KB

πŸ” What Is Enumeration?

Most people who try to explain enumeration say things like "it's listing" or "it's sorting." That's not wrong β€” but it's not useful either. Let's actually explain it.


🧠 The Real Definition

Enumeration is the process of actively pulling information from a target to build a complete picture of what's there, how it's configured, and where the weaknesses are.

It's not just finding open ports. It's interrogating every service behind those ports, mapping out the structure of a network, identifying software versions, finding hidden directories, discovering subdomains, and piecing together everything that could lead to access.


🏠 Think of it like this

If scanning is scoping a building for unlocked doors and windows β€” enumeration is what happens after you find them.

You walk into the building and move through every accessible room. You try every desk drawer. You check the filing cabinets to see which ones are unlocked. You look in the medicine cabinet. You read the labels on everything in sight. You're not just confirming the door was open β€” you're figuring out exactly what's inside, what's valuable, what's poorly secured, and what gives you your next move.

You're looking for attack surfaces β€” the places where something is exposed, misconfigured, outdated, or just left open by accident. Every unlocked drawer is a potential vulnerability. Every labeled file is information you can use. Every medicine cabinet tells you something about the person who lives there.


πŸ”„ Where Enumeration Fits in the Workflow

Reconnaissance (passive β€” OSINT, no target contact)
        ↓
Scanning (active β€” nmap, find open ports)
        ↓
Enumeration (active β€” interrogate every open port and service)
        ↓
Vulnerability Identification
        ↓
Exploitation
        ↓
Post-Exploitation & Pillaging

Enumeration comes after scanning and before exploitation. You use what nmap gave you and go deeper on every single thing it found.


πŸ“‘ Passive vs Active Enumeration

Passive enumeration means gathering information without directly touching the target. You're using publicly available sources β€” OSINT tools, search engines, certificate logs, WHOIS records, social media. The target never sees you.

Active enumeration means directly interacting with the target β€” running tools against it, sending requests, probing services. The target can potentially log your activity.

Most engagements use both. You start passive to build context, then go active once you're ready to engage.


πŸ—‚οΈ The Four Types of Enumeration

πŸ—οΈ Infrastructure Enumeration

Mapping the overall structure of the target β€” DNS servers, mail servers, web servers, cloud instances, IP ranges. Think of it like drawing a blueprint of the building before you go inside. You're figuring out how everything connects and what's exposed to the internet versus what lives internally.

This is also where you identify security measures β€” firewalls, WAFs (Web Application Firewalls), and IDS (Intrusion Detection Systems). Knowing what's watching you helps you decide how loud to be.

βš™οΈ Service Enumeration

Once you know what ports are open, you interrogate each service behind them. What software is it running? What version? What information does it expose? An outdated service version is often a direct path to exploitation β€” many administrators leave vulnerable services running because they're afraid changing them will break something.

Version numbers are gold. Every version number nmap gives you is a potential CVE search.

πŸ–₯️ Host Enumeration

Going deep on individual machines. What OS is running? What services? What files are accessible? What's misconfigured? This happens both externally β€” before you're inside β€” and internally, after you've gained access. Internal host enumeration often reveals services that admins assume are "safe" because they're not exposed to the internet. Those assumptions create the most interesting misconfigurations.

πŸ’° Pillaging

Pillaging happens after exploitation β€” once you're inside a host, you collect everything useful. Employee names, credentials, configuration files, scripts, customer data, internal documentation. This information can be used to escalate privileges, move laterally to other systems, or demonstrate impact to a client. It's not enumeration in the traditional sense β€” it's what enumeration leads to.


❌ Why Skipping Enumeration Loses You the Box

In CTF and real engagements, the answer is almost always sitting behind something you didn't enumerate thoroughly enough.

  • The foothold was a forgotten subdomain running an old version of a CMS
  • The privesc was a cron job running as root that you'd have seen if you checked /etc/crontab
  • The lateral movement path was an SMB share with weak permissions that enum4linux-ng would have found in 30 seconds

Enumeration is where boxes get solved and assessments get findings. It is not optional.


by SudoChef Β· Part of the SudoCode Pentesting Methodology Guide