Enumerating Hosts Using Wireshark, Windows, and Linux Commands

CEH Exam Domain:
Domain 2: Analysis/Assessments
Domain 4: Information Security Tools

CEH Objective Mapping:
Objective 2.2 Information Security and Communication Technologies
Objective 4.3 Information Security Tools

Overview

In this lab, you will learn to enumerate or list various resources on a target host. 

outcomes:

In this lab, you will learn to :

  1.  Use Armitage to scan a network.
  2. Use system commands to enumerate or list resources on a target system.

Key terms and descriptions

ifconfig
Interface Configuration is a system/network utility in the Linux operating systems to configure, manage, and query network interface parameters.
nmap
A port scanner which will indicate whether ports are open or closed on a remote system.
Kali Linux
An Advanced Penetration Testing Linux distribution designed for digital forensics and penetration testing, ethical hacking, and network security assessments.
Wireshark
A free and open-source protocol analyzer which will allow a user to capture network traffic or to analyze a capture file.
PostgreSQL
Is an open-source object-relational database management system. As a database server, its primary function is to store data securely.