This paper is published in Volume-6, Issue-3, 2020
Area
Computer Science and Engineering
Author
Karthik J. Bhat, Karthik P., Mithun B. L., Nishith B. Rao, Dr. Sangeetha
Org/Univ
Sai Vidya Institute of Technology, Bengaluru, Karnataka, India
Pub. Date
02 June, 2020
Paper ID
V6I3-1377
Publisher
Keywords
Attack, Enumeration, Hacker, Web-Server

Citationsacebook

IEEE
Karthik J. Bhat, Karthik P., Mithun B. L., Nishith B. Rao, Dr. Sangeetha. WebEnum, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Karthik J. Bhat, Karthik P., Mithun B. L., Nishith B. Rao, Dr. Sangeetha (2020). WebEnum. International Journal of Advance Research, Ideas and Innovations in Technology, 6(3) www.IJARIIT.com.

MLA
Karthik J. Bhat, Karthik P., Mithun B. L., Nishith B. Rao, Dr. Sangeetha. "WebEnum." International Journal of Advance Research, Ideas and Innovations in Technology 6.3 (2020). www.IJARIIT.com.

Abstract

When you want to compromise a system or infrastructure, the most critical phase you have to care about is information gathering. Then you enumerate the system using gathered information to get the exact version of protocols or software. Enumeration is one important phase where you extract the user information, network share, banner grabbing and retrieval of network protocol information. Enumeration is so important because one bad move could lure you to a rabbit hole which gives false information using that you can't compromise a system and you waste most of the time in it. So when you spend the most time in this enumeration phase you would get exact information about the system. It will save you some time and it will avoid getting you frustrated. When you are hacking a big network every information you should gather correctly. So some information will help you in further phases like privilege escalation or clearing tracks.