Monthly Archives: April 2018

Ethical hacking week 5 & 6

Enumeration extracts info about: – resources or shares on the network – usernames or groups assigned on the network – last time the user has logged on – user’s password Tools: NBT Scan, NBTstat, netview CVE number is the vulnerability … Continue reading

Posted in Uncategorized | Comments Off on Ethical hacking week 5 & 6