🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page

Network Scanning Enumaration & Vulnerability Detection Tools

Network Scanning & Enumeration is a critical phase in fields such as cybersecurity, penetration testing, and network management. It involves systematically discovering and identifying devices, services, and vulnerabilities within a target network. Network scanning helps map out the network's structure, uncover open ports, and detect active hosts, while enumeration focuses on gathering detailed information about those devices and services, such as operating systems, usernames, and shared resources.

This process is crucial for assessing network security, identifying potential entry points for attacks, or diagnosing network performance issues. It is often the second step in performing security assessments, vulnerability management, or ethical hacking, following information gathering and reconnaissance.

The tools can used for netwok footprinting & enumeration is as follows :

Banner Garbbing Tools-------------------------------------- 
1. Telnet :  Command Line Utility Tool
2. Wireshark : https://www.wireshark.org/download.html
------------------------------------------------------------

Port Scanning Tools----------------------------------------- 
1. NMap : https://www.nmap.org
2. RustScan : https://www.wireshark.org/download.html
3. Sx (Portable network tool) : https://github.com/v-byte-cpu/sx
4. Magaping : https://magnetosoft.com/product-megaping/
5. Netscan
6. MSF Console
------------------------------------------------------------

Ping Sweep tools ------------------------------------------- 
1. Angry IP Scanner : https://angryip.org
2. Advanced IP Scanner : https://www.advanced-ip-scanner.com
------------------------------------------------------------

Packet Crafting tools -------------------------------------- 
1. Colasoft Packet Builder : https://www.colasoft.com/help/7.1/tools_pktbuilder.html
-------------------------------------------------------------------------------------

Enumeration Tools ------------------------------------------  
1. RPC Scan : https://github.com/hegusung/RPCScan
2. SuperENUM : https://github.com/p4pentest/SuperEnum
------------------------------------------------------------

LDAP & NetBIOS Enumeration Tools ---------------------------
1. Active Directory Explorer
2. Global Network Inventory
3. NetBIOS Enumerator
------------------------------------------------------------

SMB & SNMP Enumaration ------------------------------------
1. SMB Eagle
2. Softperfect Network Scanner (SNMP WALK)
3. SNMPWalk (Command Line Utility)
------------------------------------------------------------

Vulnerability Detection tools-------------------------------
1. Openvas 
2. Nessus
3. Trivy (Docker Image Scanner)
------------------------------------------------------------

PreviousARIN Website RegistryNextNMAP & SuperENUM

Last updated 5 months ago