Lab 6
Enumerating the System Using Hyena
Hyena uses an Explorer-styk interfacefora// operations, including right mouse dick pop-/p context menus for all objects. Management of users, groups (both local and global), shares, domains, computers, services, devices, events, files, printers andprint jobs, sessions, open files, disk space, user rights, messaging, expo/ting job scheduling, processes, andprinting are all suppo/ted.
Lab Scenario
The hacker enumerates applications and banners m addition to identifying user accounts and shared resources. in tliis lab. Hyena uses an Explorer-style interface for all operations, management of users, groups (bodi local and global), shares, domains, computers, services, devices, events, tiles, printers and print jobs, sessions, open tiles, disk space, user nglits, messaging, exporting, job scheduling, processes, and printing are all supported. To be an expert ethical hacker and penetration tester, you must have sound knowledge of enumeration, which requires an active connection to the maclune being attacked.
Lab Objectives
The objective of this lab is to help suidents learn and perform network enumeration:
■ Users information in the system
■ Services running in the system
Lab Environment
To perform the lab, you need:
■ A computer ranning Windows Server 2012
■ Administrative privileges to install and run tools
■ You can also download tins tool from following link http://www. systemtools.com/livena/download.litm
■ If you decided to download latest version of tins tool screenshots may differ
Lab Duration
Time: 10 Minutes
Overview of Enumeration
Enumeration is die process of extracting user names, machine names, network resources, shares, and sendees from a system. Enumeration techniques are conducted in an intranet environment
Lab Tasks
The basic idea in diis section is to:
![]() |
FIGURE 6.1: Installation of Hyena |
4. Select I ac c ept the terms of the license agreement to continue and click Next.
![]() |
FIGURE 6.2: Select die Agreement |
6. Click Next to continue the installation.
![]() |
FIGURE 6.3: Selecting folder for installation |
![]() |
FIGURE 6.4: selecting installation type |
![]() |
FIGURE 6.5: Ready to install window |
![]() |
FIGURE 6.6: Windows Seiver 2012—Desktop view |
![]() |
FIGURE 6.7: Windows Server 2012 — Apps |
11. The Registration window will appear. Click OK to continue.
12. The main window of Hyena is shown 111 following figiire.
13. Click + to expand Local workstation, and then click Users.
![]() |
FIGURE 6.9: Expand the System users |
14. To check the services running on the system, double-click Services
![]() |
FIGURE 6.10: Sendees running in the system |
15. To check the User Rights, click + to expand it
![]() |
FIGURE 6.11: Users Rights |
![]() |
FIGURE 6.12: Scheduled jobs |
Lab Analysis
Analyze and document the results related to die lab exercise. Give your opinion on your target’s security ״ posture and exposure.
![]() |
Thêm chú thích |
Không có nhận xét nào:
Đăng nhận xét