For the first time, I want to introduce the term first. What is Enumerate?
Enumerate / enumeration is one phase in penetration testing to extract all target information. Like the name of the machine, network resources and services that run on a system. Often also called an Enum. In recent years the enumerate function can be found in the metasploit or other security tools.
What is the enumerate function? In addition to getting all information on a target, it can also be used to expand / enrich information for multiple targets (scope targets). So as much information is obtained it will function more at present or later (even though the information is very insignificant).
For example Nmap, Nessus, Hydra, Auxillary Metasploit tools, etc. Now for the enumerate function itself is very broad. Can be categorized every time we try to get target information, it can be said to be enumerate
For VM Kali Linux it has been prepared.
I will go to the point of guessing credential WebApps. Webapps: Web application. Today the WebApps & Mobile apps application is very much. Of course, the target attack will also be found in both apps. Now try this material, name is login.php.
Please copy to the
/var/www/html directory. Beforehand, make sure to service Apache to activate the apache: service apache2 start. Then call in the browser with url http: //localhost/login.php or http://yourIP/login.php
Gueesing: What do you want to guess? Of course in this case the username and password. To find out a valid username & password in a webapps.
Because this is only a simulation, for my hardcode credential in the login.php source code.
I continue to create Simple Enumerate using python script. Please try to create a python script with the script below. (for testing) to set the directory in the
~/Desktop/Simple enumerate for guessing webapps folder
nano -T4 test.py.
-T4 — > is used for tab spacing on the 4-spaced nano editor. Why 4? It’s standard for scripting to use python.
Calling enumarate_cridential function with username and password: kali and kali2.
Then continue to create a script with simple wordlist which has been conditioned there is a valid username & password.
nano -T4 en_simple_enumerate.py.
Username & Password has been found. Username : kali, Password: indonesia.
Note: The length of the enumerate process, depends on what will be enumerated. If the case above depends on the number of wordlists. As a penetration tester, the more wordlists collected through information gathering or others will increase the frequency of guessing credential success