Ethical Hacking: Enumeration
Ethical Hacking: Enumeration
Module IV
Enumeration
Module Objective
• Understanding Windows 2000 enumeration
• How to Connect via Null Session
• How to disguise NetBIOS Enumeration
• Disguise using SNMP enumeration
• How to steal Windows 2000 DNS information
using zone transfers
• Learn to enumerate users via CIFS/SMB
• Active Directory enumerations
What is Enumeration
• If acquisition and non intrusive probing have not turned up
any results, then an attacker will next turn to identifying valid
user accounts or poorly protected resource shares.
• Enumeration involves active connections to systems and
directed queries.
• The type of information enumerated by intruders:
– Network resources and shares
– Users and groups
– Applications and banners
Net Bios Null Sessions
• A null session occurs when you log in to a system with no username
or password.
• NetBIOS null sessions are vulnerability found in the Common
Internet File System (CIFS) or SMB, depending on the operating
system.
• You can establish a Null Session with a Windows (NT/2000/XP) host
by logging on with a null user name and password.
• Using these null connections allows you to gather the following
information from the host:
– List of users and groups
– List of machines
– List of shares
– Users and host SIDs (Security Identifiers)
So What's the Big Deal?
Anyone with a NetBIOS The attacker now has a
connection to your computer channel over which to attempt
can easily get a full dump of all various techniques.
your usernames, groups, The CIFS/SMB and NetBIOS
shares, permissions, policies, standards in Windows 2000
services and more using the include APIs that return rich
Null user. information about a machine
One method of connecting via TCP port 139 - even to
a NetBIOS null session to a unauthenticated users.
Windows system is to the C: \>net use \\192.34.34.2
hidden Inter Process \IPC$ '''' /u: '''‘
Communication 'share' (IPC$)
at IP address 192.34.34.2 with
the built- in anonymous user
(/u:'''') with ('''') null
password.
Null Session Countermeasure
• Null sessions require access to TCP 139 and/ or TCP 445 ports. One
countermeasure is to close these ports on the target system.
• You could also disable SMB(Server Message Block-network protocol)
services entirely on individual hosts by unbinding WINS Client TCP/IP from
the interface.
• To implement this countermeasure, perform the following steps:
1. Open the properties of the network connection.
2. Click TCP/IP and then the Properties button.
3. Click the Advanced button.
4. On the WINS tab, select disable NetBIOS over TCP/IP. A security
administrator can also edit the registry directly to restrict the
anonymous user from login.
SNMP Enumeration
• SNMP(Simple Network Management Protocol) is simple.
Managers send requests to agents, and the agents send back
replies.
• The requests and replies refer to variables accessible to agent
software.
• Managers can also send requests to set values for certain
variables.
• Traps let the manager know that something significant has
happened at the agent's end of things:
– a reboot
– an interface failure,
– or that something else that is potentially bad has happened.
• Enumerating NT users via SNMP protocol is easy using
snmputil
SNMPutil example
Tool: IP Network Browser
SNMP Enumeration Countermeasures