Answer Posted / chaitanya
The process of extracting machine name, user names, network resources, shares and services from a system. Under Intranet environment enumeration techniques are conducted
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What os do hackers use?
Who is the best hacker in the world?
What are the 3 types of hackers?
Who is the most dangerous hacker?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
How do hackers hack passwords?
What software do hackers use?
What laptops do hackers use?
What is footprinting in ethical hacking? What is the techniques used for footprinting?
What laptops hackers use?
What tools do real hackers use?