What is Enumeration?
Refers to listing things one-by-one. Itemising if you like.
This may include analysing the network and examining the devices and services identified in the scanning phase.
What information will Enumeration help to find?
How is the information from Scanning and Enumeration used?
The information obtained through scanning and enumeration can be used to:
identify vulnerabilities.
These can be reported as part of the vulnerability assessments. These vulnerabilities can be taken advantage of as part of the penetration testing or ethical hacking process.
What are the tools that can be used for Scanning and Enumeration?