What useful information can be obtained by running a network share enumeration scan during a penetration test?
- systems on a network that are sharing files, folders, and printers
- the usernames and password credentials of users on the network
- all vulnerable hosts on the network
- lists of the attack vectors that can exploit the network
Explanation & Hint: A network share enumeration scan can identify network systems that share files, folders, and printers. This information helps build out the attack surface of an internal network.
|