User Enumeration

in the enumeration phase attacker creates and performs activities connections to system and perms directed queries to gain more information about the taget

attackers use extracted information to identify system attack point and perform password attacks to gain unauthorized access to information system resources

user enumeration
user enumeration

Enumeration pen testing

in order to enumerate important servers find the network range using tools such as “whoise lookup”

calculate the subnet mask required for the ip range using subnet mask calculators that can be given as an input to many of the ping sweep and port scanning tools

perform port scanning to check for the open ports on the nodes using such as nmap