Enumeration: Build a Target List
In this lab, you’ll practice building a target list by performing network enumeration. When you’re finished, you’ll have an understanding on how to perform effective and comprehensive network enumeration.
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
Host Enumeration
You'll use a variety of techniques to search for hosts on the network, and identify the trade-off between, speed, effectiveness and stealth.
Challenge
Port and Service Enumeration
Having identified a number of potential targets on the network, your next challenge is to identify operating systems, open ports, and services on the in-scope hosts.
Challenge
File Share Enumeration
You'll gather information about an FTP service, identify insecure configuration, and enumerate files and folders to search for potentially sensitive or valuable documents.
Challenge
User Enumeration
You'll use a variety of techniques to enumerate users on the target systems by taking advantage of weak NFS configuration and interrogating the SMTP server.
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Learners should be familiar with/know how to use:
- Terminal commands such as ifconfig, route, and arp
- tcpdump
- Netcat
- Nmap