Enumeration and System Hacking
Introduction
Chapter 4 introduces Windows enumeration and hacking. It gives you the knowledge you need to prepare for the Certified Ethical Hacker Exam, and it broadens your knowledge of Windows security controls and weaknesses. However, this Chapter addresses the basic information, as it would require an entire book to cover all Windows hacking issues. If you are seriously considering a career as a penetration tester, this Chapter should whet your appetite for greater knowledge.
The Chapter begins by examining the architecture of Windows computers. A review of Windows users and groups is discussed. Next, enumeration is discussed Enumeration is the final preattack phase in which you probe for usernames, system roles, account details, open shares, and weak passwords. The last topic is Windows hacking. This section discusses the tools and techniques used for Windows hacking. Although many of the tools introduced are specific to Windows systems, the steps are the same no matter what the platform. This is evident in Chapter 5 when Linux is discussed.
The Architecture of Windows Computers
|