Ethical Hacking Crash Course

0 of 21 lessons complete (0%)

Metasploitable 2 – Enumeration Methods

Enumeration Tools Setup

The enumeration phase is critical in penetration testing and ethical hacking as it involves actively probing a target to gather detailed information about its network, systems, and services. This phase goes beyond simple scanning, enabling attackers to identify user accounts, network shares, running services, and potential entry points for exploitation.

By uncovering this granular information, ethical hackers can better understand the target’s environment, identify vulnerabilities, and develop more precise attack strategies. Effective enumeration lays the groundwork for successful exploitation and helps in creating comprehensive security assessments.

Before we begin enumeration we will make sure we have the following tools installed:

  • rustscan
  • nuclei
  • gobuster
  • seclists

Use the following commands to install each tool:

For rustscan:
mkdir ~/tools
wget https://github.com/RustScan/RustScan/releases/download/2.0.1/rustscan_2.0.1_amd64.deb -P /home/kali/tools
sudo dpkg -i /home/kali/tools/rustscan_2.0.1_amd64.deb

For nuclei:
sudo apt-get install nuclei

For gobuster:
sudo apt-get install gobuster

For the seclists wordlist:
sudo apt-get install seclists

We will also update searchsploit/exploitdb with the following:
searchsploit -u