Service Enumeration
Deep enumeration extracts detailed information from discovered services to identify misconfigurations, credentials, and attack vectors for exploitation. Each protocol requires specific tools and techniques.
Tip
Enumeration Guides
SMB Enumeration
Port 445Enumerate SMB shares, users, and sensitive files. Null session testing, spidering, and relay attack setup.
LDAP & Active Directory
Port 389/636Query LDAP for users, groups, computers, GPOs, trusts. PowerView, ldapdomaindump, and windapsearch.
Kerberos Enumeration
Port 88User enumeration, AS-REP roasting, Kerberoasting, and delegation discovery. Kerbrute, Rubeus, and Impacket.
DNS Enumeration
Port 53Zone transfers, SRV records, ADIDNS poisoning, and reverse lookups. DNSrecon and adidnsdump.
Database Enumeration
Port 1433/3306MSSQL, MySQL, PostgreSQL enumeration. xp_cmdshell, linked servers, and credential extraction.
Cloud & Hybrid
Azure/M365Azure tenant discovery, M365 endpoint enumeration, service principal mapping, and cloud credential discovery from internal network.
Enumeration Workflow
Information
Recommended Order
- SMB - Null sessions, shares, sensitive files
- DNS - Zone transfers, SRV records, host discovery
- LDAP - Users, groups, password policies
- Kerberos - AS-REP roast, Kerberoast, delegation
- Databases - Default creds, linked servers, command execution
Quick Reference
| Service | Ports | Quick Win Tools |
|---|---|---|
| SMB | 445, 139 | nxc smb -u '' -p '' --shares |
| LDAP | 389, 636 | ldapdomaindump -u 'user' -p 'pass' ldap://DC |
| Kerberos | 88 | kerbrute userenum -d DOMAIN users.txt |
| DNS | 53 | dig @DC DOMAIN AXFR |
| MSSQL | 1433 | nxc mssql -u user -p pass -x whoami |