What initial information can be obtained when performing user enumeration in a penetration test?
- a valid list of users
- the IP addresses of the target hosts
- the credentials of a specified user
Explanation & Hint: When access to the target internal network has been achieved, user enumeration tools will gather a valid list of users. A username is the first step in attempting to crack a set of credentials.
|