CEH Lab Guide
CEH Lab Guide
Lab Tasks
Ethical hackers or penetration testers use several tools and techniques to enumerate the target
network. Recommended labs that will assist you in learning various enumeration techniques include:
1. Perform NetBIOS enumeration
o Perform NetBIOS enumeration using Windows command-line utilities
o Perform NetBIOS enumeration using NetBIOS Enumerator
o Perform NetBIOS enumeration using an NSE Script
2. Perform SNMP enumeration
o Perform SNMP enumeration using snmp-check
o Perform SNMP enumeration using SoftPerfect Network Scanner
3. Perform LDAP enumeration
o Perform LDAP enumeration using Active Directory Explorer (AD Explorer)
4. Perform NFS enumeration
o Perform NFS enumeration using RPCScan and SuperEnum
5. Perform DNS enumeration
o Perform DNS enumeration using zone transfer
o Perform DNS enumeration using DNSSEC zone walking
6. Perform RPC, SMB, and FTP enumeration
o Perform RPC and SMB enumeration using NetScanTools Pro
o Perform RPC, SMB, and FTP enumeration using Nmap
7. Perform enumeration using various enumeration tools
o Enumerate information using Global Network Inventory
o Enumerate network resources using Advanced IP Scanner
o Enumerate information from Windows and Samba host using Enum4linux
Nbtstat helps in troubleshooting NETBIOS name resolution problems. The nbtstat command
removes and corrects preloaded entries using several case-sensitive switches. Nbtstat can be used to
enumerate information such as NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables
for both the local and remote computers, and the NetBIOS name cache.
Net use connects a computer to, or disconnects it from, a shared resource. It also displays
information about computer connections.
Here, we will use the Nbtstat, and Net use Windows command-line utilities to perform NetBIOS
enumeration on the target network.
We will use a Windows Server 2019 (10.10.10.19) machine to target a Windows 10 (10.10.10.10)
machine.
1. Click Windows Server 2019 to switch to the Windows Server 2019 machine.
2. Click Ctrl+Alt+Delete to activate the machine. By default, Administration user
profile is selected, click Pa$$w0rd to paste the password in the Password field and
press Enter to login.
Alternatively, you can also click Pa$$w0rd under Windows Server 2019 machine
thumbnail in the Resources pane or Click Type Text | Type Password button under
Commands (thunder icon) menu.
Networks screen appears, click Yes to allow your PC to be discoverable by other PCs and
devices on the network.
3. Open a Command Prompt window.
4. Type nbtstat -a [IP address of the remote machine] (in this example, the target IP
address is 10.10.10.10) and press Enter.
In this command, -a displays the NetBIOS name table of a remote computer.
5. The result appears, displaying the NetBIOS name table of a remote computer (in
this case, the WINDOWS10 machine), as shown in the screenshot.
6. In the same Command Prompt window, type nbtstat -c and press Enter.
In this command, -c lists the contents of the NetBIOS name cache of the remote
computer.
7. The result appears, displaying the contents of the NetBIOS name cache, the table of
NetBIOS names, and their resolved IP addresses.
It is possible to extract this information without creating a null session (an
unauthenticated session).
8. Now, type net use and press Enter. The output displays information about the
target such as connection status, shared folder/drive and network information, as shown
in the screenshot.
9. This concludes the demonstration of performing NetBIOS enumeration using
Windows command-line utilities such as Nbtstat and Net use.
10. Close all open windows and document all the acquired information.
NetBIOS Enumerator is a tool that enables the use of remote network support and several other
techniques such as SMB (Server Message Block). It is used to enumerate details such as NetBIOS
names, usernames, domain names, and MAC addresses for a given range of IP addresses.
Here, we will use the NetBIOS Enumerator to perform NetBIOS enumeration on the target network.
We will use a Windows 10 machine to target Windows Server 2016 and Windows Server
2019 machines.
1. Click Windows 10 to switch to the Windows 10 machine, click Ctrl+Alt+Delete .
Alternatively, you can also click Ctrl+Alt+Delete button under Windows 10 machine
thumbnail in the Resources pane or Click Ctrl+Alt+Delete button under Commands
(thunder icon) menu.
2. By default, Admin user profile is selected, click Pa$$w0rd to paste the password in
the Password field and press Enter to login.
Alternatively, you can also click Pa$$w0rd under Windows 10 machine thumbnail in
the Resources pane or Click Type Text | Type Password button under Commands
(thunder icon) menu.
If Welcome to Windows wizard appears, click Continue and in Sign in with
Microsoft wizard, click Cancel.
Networks screen appears, click Yes to allow your PC to be discoverable by other PCs and
devices on the network.
3. In the Windows 10 machine, navigate to D:\CEH-Tools\CEHv11 Module 04
Enumeration\NetBIOS Enumeration Tools\NetBIOS Enumerator and double-
click NetBIOS Enumerater.exe.
If the Open - File Security Warning pop-up appears, click Run.
4. The NetBIOS Enumerator main window appears, as shown in the screenshot.
5. Under IP range to scan, enter an IP range in the from and to fields and click
the Scan button to initiate the scan (In this example, we are targeting the IP
range 10.10.10.15-10.10.10.20).
6. NetBIOS Enumerator scans for the provided IP address range. On completion, the
scan results are displayed in the left pane, as shown in the screenshot.
10. Close all open windows and document all the acquired information.
NSE allows users to write (and share) simple scripts to automate a wide variety of networking tasks.
NSE scripts can be used for discovering NetBIOS shares on the network. Using the nbstat NSE script,
for example, you can retrieve the target’s NetBIOS names and MAC addresses. Moreover, increasing
verbosity allows you to extract all names related to the system.
Here, we will run the nbstat script to enumerate information such as the name of the computer and
the logged-in user.
7. Other tools may also be used to perform NetBIOS enumeration on the target
network such as Global Network Inventory (http://www.magnetosoft.com), Advanced
IP Scanner (http://www.advanced-ip-scanner.com), Hyena (https://www.systemtools.co
m), and Nsauditor Network Security Auditor (https://www.nsauditor.com).
8. Close all open windows and document all the acquired information.
snmp-check is a tool that enumerates SNMP devices, displaying the output in a simple and reader-
friendly format. The default community used is “public.” As an ethical hacker or penetration tester, it
is imperative that you find the default community strings for the target device and patch them up.
Here, we will use the snmp-check tool to perform SNMP enumeration on the target IP address
We will use a Parrot Security (10.10.10.13) machine to target a Windows Server 2016 (10.10.10.16)
machine.
1. Click Parrot Security to switch to the Parrot Security machine.
2. In the login page, the attacker username will be selected by default. Enter
password as toor in the Password field and press Enter to log in to the machine.
If a Parrot Updater pop-up appears at the top-right corner of Desktop, ignore and
close it.
If a Question pop-up window appears asking you to update the machine, click No to
close the window.
11. The result appears as shown in the screenshot. It reveals that the extracted SNMP
port 161 is being used by the default “public” community string.
If the target machine does not have a valid account, no output will be displayed.
12. The snmp-check command enumerates the target machine, listing sensitive
information such as System information and User accounts.
13. Scroll down to view detailed information regarding the target network under the
following sections: Network information, Network interfaces, Network
IP and Routing information, and TCP connections and listening ports.
14. Similarly, scrolling down reveals further sensitive information
on Processes, Storage information, File system information, Device
information, Share, etc.
15. This concludes the demonstration of performing SNMP enumeration using the
snmp-check.
16. Close all open windows and document all the acquired information.
Task 2: Perform SNMP Enumeration using SoftPerfect Network
Scanner
SoftPerfect Network Scanner can ping computers, scan ports, discover shared folders, and retrieve
practically any information about network devices via WMI (Windows Management Instrumentation),
SNMP, HTTP, SSH, and PowerShell.
The program also scans for remote services, registries, files, and performance counters. It can check
for a user-defined port and report if one is open, and is able to resolve hostnames as well as auto-
detect your local and external IP range. SoftPerfect Network Scanner offers flexible filtering and
display options, and can export the NetScan results to a variety of formats, from XML to JSON. In
addition, it supports remote shutdown and Wake-On-LAN.
Here, we will use the SoftPerfect Network Scanner to perform SNMP enumeration on a target
system.
8. Click the Mark All/None button to select all the items available for SNMP scanning
and close the window.
9. To scan your network, enter an IP range in the IPv4 From and To fields (in this
example, the target IP address range is 10.10.10.5-10.10.10.20), and click the Start
Scanning button.
10. The status bar at the lower-right corner of the GUI displays the status of the scan.
11. The scan results appear, displaying the active hosts in the target IP address range,
as shown in the screenshot.
12. To view the properties of an individual IP address, right-click a particular IP address
(in this example, 10.10.10.16) and select Properties, as shown in the screenshot.
13. The Properties window appears, displaying the Shared Resources and Basic
Info of the machine corresponding to the selected IP address.
14. Close the Properties window.
15. To view the shared folders, note the scanned hosts that have a + node before them.
Expand the node to view all the shared folders.
In this example, we are targeting the Windows Server 2016 machine (10.10.10.16).
16. Right-click the selected host, and click Open Device. A drop-down list appears,
containing options that allow you to connect to the remote machine over HTTP, HTTPS,
FTP, and Telnet.
If the selected host is not secure enough, you may use these options to connect to the
remote machines. You may also be able to perform activities such as sending a message
and shutting down a computer remotely. These features are applicable only if the
selected machine has a poor security configuration.
17. This concludes the demonstration of performing SNMP enumeration using the
SoftPerfect Network Scanner.
18. You can also use other SNMP enumeration tools such as Network Performance
Monitor (https://www.solarwinds.com), OpUtils (https://www.manageengine.com), PRT
G Network Monitor (https://www.paessler.com), Engineer’s
Toolset (https://www.solarwinds.com), and WhatsUp®
Gold (https://www.ipswitch.com) to perform SNMP enumeration on the target network.
19. Close all open windows and document all the acquired information.
Active Directory Explorer (AD Explorer) is an advanced Active Directory (AD) viewer and editor. It can
be used to navigate an AD database easily, define favorite locations, view object properties and
attributes without having to open dialog boxes, edit permissions, view an object’s schema, and
execute sophisticated searches that can be saved and re-executed.
Here, we will use the AD Explorer to perform LDAP enumeration on an AD domain and modify the
domain user accounts.
11. You can also use other LDAP enumeration tools such as Softerra LDAP
Administrator (https://www.ldapadministrator.com), LDAP Admin
Tool (https://www.ldapsoft.com), LDAP Account Manager (https://www.ldap-account-
manager.org), LDAP Search (https://securityxploded.com),
and JXplorer (http://www.jxplorer.org) to perform LDAP enumeration on the target.
12. Close all open windows and document all the acquired information.
RPCScan communicates with RPC (remote procedure call) services and checks misconfigurations on
NFS shares. It lists RPC services, mountpoints,and directories accessible via NFS. It can also
recursively list NFS shares. SuperEnum includes a script that performs a basic enumeration of any
open port, including the NFS port (2049).
Here, we will use RPCScan and SuperEnum to enumerate NFS services running on the target
machine.
Before starting this lab, it is necessary to enable the NFS service on the target machine (Windows
Server 2019). This will be done in steps 1-6.
1. In the Windows Server 2019 machine, click the Start button at the bottom-left
corner of Desktop and open Server Manager.
21. In the terminal window, type cd .. and press Enter to return to the root directory.
22. Now, we will perform NFS enumeration using RPCScan. To do so, type cd
RPCScan and press Enter
23. Type python3 rpc-scan.py [Target IP address] --rpc (in this case, the target IP
address is 10.10.10.19, the Windows Server 2019 machine); press Enter.
--rpc: lists the RPC (portmapper); the target IP address may differ in your lab
environment.
24. The result appears, displaying that port 2049 is open, and the NFS service is running
on it.
25. This concludes the demonstration of performing NFS enumeration using
SuperEnum and RPCScan.
26. Close all open windows and document all the acquired information.
DNS zone transfer is the process of transferring a copy of the DNS zone file from the primary DNS
server to a secondary DNS server. In most cases, the DNS server maintains a spare or secondary
server for redundancy, which holds all information stored in the main server.
If the DNS transfer setting is enabled on the target DNS server, it will give DNS information; if not, it
will return an error saying it has failed or refuses the zone transfer.
Here, we will perform DNS enumeration through zone transfer by using the dig (Linux-based
systems) and nslookup (Windows-based systems) tool.
21. Close all open windows and document all the acquired information.
DNSSEC zone walking is a DNS enumeration technique that is used to obtain the internal records of
the target DNS server if the DNS zone is not properly configured. The enumerated zone information
can assist you in building a host network map.
There are various DNSSEC zone walking tools that can be used to enumerate the target domain’s
DNS record files.
Here, we will use the DNSRecon tool to perform DNS enumeration through DNSSEC zone walking.
10. Close all open windows and document all the acquired information.