# 8. Enumeration using various tools

## 1. Enumerate using Global Network Inventory

Global Network Inventory is used as an audit scanner in zero deployment and agent-free environments. It scans single or multiple computers by IP range or domain, as defined by the Global Network Inventory host file.

{% embed url="<https://magnetosoft.com/product-global-network-inventory/>" %}
Use it if every thing fails
{% endembed %}

1. After installation, open the tool. The **Global Network Inventory** GUI appears. Click **Close** on the **Tip of the Day** pop-up.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/1ydpkeos.jpg)
2. The **New Audit Wizard** window appears; click **Next**.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/iwloiywh.jpg)
3. Under the **Audit Scan Mode** section, click the **Single address scan** radio button, and then click **Next**.

   > You can also scan an IP range by clicking on the **IP range scan** radio button, after which you will specify the target IP range.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/r2vbv1pp.jpg)
4. Under the **Single Address Scan** section, specify the target IP address in the **Name** field of the **Single address** option (in this example, the target IP address is **10.10.1.22**); Click **Next**.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/2e2asklc.jpg)
5. The next section is **Authentication Settings**; select the **Connect as** radio button and enter the **Windows Server 2022** machine credentials (Domain\Username: **Administrator** and Password: **Pa$$w0rd**), and then click **Next**.

   > In reality, attackers do not know the credentials of the remote machine(s). In this situation, they choose the **Connect as currently logged on user** option and perform a scan to determine which machines are active in the network. With this option, they will not be able to extract all the information about the target system. Because this lab is just for assessment purposes, we have entered the credentials of the remote machine directly.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/133gjwh3.jpg)
6. In the final step of the wizard, leave the default settings unchanged and click **Finish**.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/p3y0kalh.jpg)
7. The **Scan progress** window will appear.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/dmk3s3o1.jpg)
8. The results are displayed when the scan finished. The **Scan summary** of the scanned target IP address (**10.10.1.22**) appears.

   > The scan result might vary when you perform this task.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/screens/ds1h2wgn.jpg)
9. Hover your mouse cursor over the **Computer details** under the Scan summary tab to view the **scan summary**, as shown in the screenshot.

   ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/A.jpg)
10. Click the **Operating System** tab and hover the mouse cursor over **Windows details** to view the complete details of the machine.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/B.jpg)
11. Click the **BIOS** tab, and hover the mouse cursor over windows details to display detailed BIOS settings information.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/C.jpg)
12. Click the **NetBIOS** tab, and hover the mouse cursor over any NetBIOS application to display the detailed NetBIOS information about the target.

    > Hover the mouse cursor over each NetBIOS application to view its details.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/D.jpg)
13. Click the **User groups** tab and hover the mouse cursor over any username to display detailed user groups information.

    > Hover the mouse cursor over each username to view its details.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/E.jpg)
14. Click the **Users** tab, and hover the mouse cursor over the username to view login details for the target machine.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/F.jpg)
15. Click the **Services** tab and hover the mouse cursor over any service to view its details.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/G.jpg)
16. Click the **Installed software** tab, and hover the mouse cursor over any software to view its details.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/H.jpg)
17. Click the **Shares** tab, and hover the mouse cursor over any shared folder to view its details.

    ![](https://labondemand.blob.core.windows.net/content/lab168797/instructions255474/I.jpg)
18. Similarly, you can click other tabs such as **Computer System**, **Processors**, **Main board**, **Memory**, **SNMP systems** and **Hot fixes**. Hover the mouse cursor over elements under each tab to view their detailed information.

## <mark style="color:red;">2. Enumerate using angry IP scanner</mark>

{% embed url="<https://angryip.org/>" %}

## <mark style="color:red;">3. Enumerate using Enum4Linux from samba and Windows hosts</mark>

enumerate netbios name

```
enum4linux -u martin -p apple -n 192.168.18.110
```

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FiGKUP1IiYubPJRkfEURn%2Fimage.png?alt=media&#x26;token=5db931d1-f9da-4356-b458-2a8fb0eaabd5" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
-n netbios

-U get usernames

-M get machine list\*&#x20;

-S get sharelist&#x20;

-P get password policy information&#x20;

-G get group and member list&#x20;
{% endhint %}

Enumerate everything

```
enum4linux -a 192.168.18.110
```

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}
