Posts

Showing posts from March, 2026

Week 5 - Target Enumeration and Uncovering Real IPs

As always, any tools, techniques, and concepts shared on this blog are strictly for educational purposes. I am not responsible for any misuse of the information or tools discussed here. All practical exercises were conducted on authorized target domains. Week 5 of Ethical Hacking and Penetration Testing moved us from discovering targets into actively enumerating them. Led by S. Pradono Suryodiningrat, the lecture focused on extracting highly specific information from our targets—things like network shares, active usernames, passwords, and the exact operating systems running on the machines. Here are my notes from the session, followed by the results of our practical lab assignment. The Theory: Enumerating Environments   Enumeration is an intrusive process. We looked heavily into enumerating Microsoft operating systems, specifically utilizing NetBIOS over TCP/IP (NBT). We practiced installing and using nbtscan on our Kali Linux setups to scan ranges of IP addresses. We also reviewe...

Week 4 - Target Discovery, OS Fingerprinting, and Port Scanning

 As always, a quick reminder that any tools, techniques, and concepts shared on this blog are strictly for educational purposes. I am not responsible for any misuse of the information or tools discussed here. We are officially in Week 4 of Ethical Hacking and Penetration Testing. This session was led by S. Pradono Suryodiningrat, and it was incredibly network-heavy. We shifted our focus from passive footprinting to active target discovery and enumeration. This is where you actually start interacting with the target machines. Here is a breakdown of my notes from the lecture and lab. 1. Target Discovery   Before you can scan a target, you have to find out if it is actually alive on the network. We looked at a bunch of tools used to ping and identify machines. The usual suspects: ping , arping , fping , hping , and nping . We also touched on alive6 for IPv6 environments and nbtscan for dealing with NetBIOS over TCP/IP. 2. OS Fingerprinting (Active vs. Passive)   Once you ...