Thứ Hai, 28 tháng 4, 2014

Enumeration p7

Lab 6
Enumerating the System Using Hyena

Hyena uses an Explorer-styk interfacefora// operations, including right mouse dick pop-/p context menus for all objects. Management of users, groups (both local and global), shares, domains, computers, services, devices, events, files, printers andprint jobs, sessions, open files, disk space, user rights, messaging, expo/ting job scheduling, processes, andprinting are all suppo/ted.

Lab Scenario

The hacker enumerates applications and banners m addition to identifying user accounts and shared resources. in tliis lab. Hyena uses an Explorer-style interface for all operations, management of users, groups (bodi local and global), shares, domains, computers, services, devices, events, tiles, printers and print jobs, sessions, open tiles, disk space, user nglits, messaging, exporting, job scheduling, processes, and printing are all supported. To be an expert ethical hacker and penetration tester, you must have sound knowledge of enumeration, which requires an active connection to the maclune being attacked.

Lab Objectives

The objective of this lab is to help suidents learn and perform network enumeration:
■ Users information in  the system
■ Services running in the system

Lab Environment

To perform the lab, you need:
■ A computer ranning Windows Server 2012
■ Administrative privileges to install and run tools
■ You can also download tins tool from following link http://www. systemtools.com/livena/download.litm
■ If you decided to download latest version of tins tool screenshots may differ

Lab Duration

Time: 10 Minutes

Overview of Enumeration

Enumeration is die process of extracting user names, machine names, network resources, shares, and sendees from a system. Enumeration techniques are conducted in an intranet environment

Lab Tasks

The basic idea in diis section is to:

FIGURE 6.1: Installation of Hyena
3. The Software License Agreement window appears, you must accept the agreement to install Hyena.
4. Select I ac c ept the terms of the license agreement to continue and click Next.

FIGURE 6.2: Select die Agreement
5. Choose die destination location to install Hyena.
6. Click Next to continue the installation.
FIGURE 6.3: Selecting folder for installation
7. The Ready to install the Program window appears. Click Install
FIGURE 6.4: selecting installation type
8. The InstallShield Wizard complete window appears. Click Finish ro complete die installation.

FIGURE 6.5: Ready to install window
9. Launch the Start menu by hovering the mouse cursor on the lower left corner of the desktop.


FIGURE 6.6: Windows Seiver 2012—Desktop view
10.Click the Hyena app to open the Hyena window.
FIGURE 6.7: Windows Server 2012 — Apps

11. The Registration window will appear. Click OK to continue.
12. The main window of Hyena is shown 111 following figiire.


13. Click + to expand Local workstation, and then click Users.

FIGURE 6.9: Expand the System users

14. To check the services running on the system, double-click Services

FIGURE 6.10: Sendees running in the system

15. To check the User Rights, click + to expand it

FIGURE 6.11: Users Rights
16. To check the Scheduled jobs, click + to expand it.

FIGURE 6.12: Scheduled jobs

Lab Analysis

Analyze and document the results related to die lab exercise. Give your opinion on your target’s security ״ posture and exposure.


Thêm chú thích















































Không có nhận xét nào:

Đăng nhận xét