Enumeration Checklist

This checklist is designed for pentesters targeting modern applications, cloud environments, and hybrid infrastructures. It emphasises automation, cloud-native services, and DevSecOps practices while maintaining a focus on thorough reconnaissance and vulnerability discovery.

Reconnaissance & Discovery

Target Identification

  • IP Address & Hostname Resolution: Identify target IPs, domains, and subdomains.

  • WHOIS & DNS Metadata: Gather domain registration details (WHOIS), SSL/TLS certificates (crt.sh, Censys), and DNS records (A, MX, TXT, CNAME).

    • Tools: dig, dnsdumpster, dnsrecon, fierce.

  • Subdomain Enumeration: Discover subdomains via brute-forcing, certificate transparency logs, and OSINT.

    • Tools: Amass, Sublist3r, Subfinder, Assetfinder.

  • Reverse DNS Lookup: Map IPs to domains.

    • Tools: nslookup, dnsrecon.

Network Mapping

  • Host Discovery: Confirm live hosts using ping sweeps, ARP scans, or non-ping methods.

    • Tools: nmap -sn, fping, masscan.

  • Traceroute: Map network paths to identify infrastructure components.

    • Tools: traceroute, mtr.

  • Topology Mapping: Visualise network layout and relationships.

    • Tools: nmap --traceroute, Zenmap.

Network & Service Enumeration

Port Scanning

  • Comprehensive Scans: Identify open ports and services (TCP/UDP).

    • Types: TCP Connect (-sT), SYN (-sS), UDP (-sU), Specific Ports (-p).

    • Tools: nmap, masscan, unicornscan.

  • Service Version Detection: Fingerprint services and versions.

    • Tools: nmap -sV, nmap --script=banner.

  • Script Scanning: Run protocol-specific NSE scripts for deeper insights.

    • Tools: nmap --script=default,safe.

Service-Specific Enumeration

  • HTTP/HTTPS: Identify web servers, frameworks, and technologies.

    • Tools: WhatWeb, Wappalyzer, Burp Suite, gobuster, dirb.

    • Tasks: Directory brute-forcing, virtual host enumeration, CORS misconfiguration checks.

  • SMB: Enumerate shares, users, and policies.

    • Tools: smbmap, smbclient, enum4linux-ng.

  • SMTP: Check for open relays and user enumeration.

    • Tools: nmap --script=smtp*, smtp-user-enum.

  • SSH: Identify versions and attempt default/weak credential checks.

    • Tools: nmap --script=ssh*, hydra, medusa.

  • DNS: Attempt zone transfers and brute-force subdomains.

    • Tools: dnsenum, fierce, dnsrecon.

  • Database Services (MySQL, Postgres, MSSQL): Check for default credentials and misconfigurations.

    • Tools: nmap --script=mysql*,postgres*,mssql*, sqlmap.

  • LDAP: Enumerate directory services for user and group data.

    • Tools: ldapsearch, nmap --script=ldap*.

  • RDP/VNC: Identify remote desktop services and weak configurations.

    • Tools: nmap --script=rdp*,vnc*, hydra.

  • SNMP: Extract device info and community strings.

    • Tools: snmpwalk, onesixtyone, nmap --script=snmp*.

System & Application Enumeration

Operating System Detection

  • OS Fingerprinting: Identify OS and versions via TCP/IP stack analysis.

    • Tools: nmap -O, p0f, netdiscover.

  • TTL Analysis: Infer OS based on Time-To-Live values.

  • SMB OS Detection: Extract OS details via SMB protocols.

    • Tools: smbclient, enum4linux-ng.

Web Application Enumeration

  • Web Server & CMS Detection: Identify web servers (Apache, Nginx) and CMS platforms (WordPress, Drupal, Joomla).

    • Tools: WhatWeb, WPScan, JoomScan, Droopescan.

  • API & Endpoint Discovery: Enumerate REST, GraphQL, and WebSocket endpoints.

    • Tools: Burp Suite, Postman, graphql-map, wscat.

  • Source Code Analysis: Extract comments, API keys, and hidden parameters from HTML/JS.

    • Tools: Burp Suite, LinkFinder, EyeWitness.

  • Framework Detection: Identify frameworks (Django, Laravel, etc.) and misconfigurations.

    • Tools: Wappalyzer, WhatWeb, BuiltWith.

  • CORS & Security Headers: Check for misconfigured CORS and missing security headers.

    • Tools: Burp Suite, curl, nmap --script=http*.

User Enumeration

  • Brute-Force Attacks: Test for weak/default credentials on exposed services (SSH, RDP, HTTP, etc.).

    • Tools: hydra, medusa, patator.

  • User Discovery: Enumerate valid usernames via service-specific methods (e.g., SMTP VRFY, web forms).

    • Tools: smtp-user-enum, Burp Intruder.

  • Social Engineering: Leverage OSINT for user-related data (LinkedIn, GitHub, email leaks).

    • Tools: theHarvester, Maltego, Hunter.io.

Cloud & Modern Infrastructure Enumeration

Cloud Service Enumeration

  • AWS: Identify misconfigured S3 buckets, EC2 instances, and IAM roles.

    • Tools: awscli, S3Scanner, CloudEnum.

  • Azure: Check for exposed Blob Storage, VMs, and Azure AD misconfigurations.

    • Tools: MicroBurst, Azurite.

  • Google Cloud: Enumerate GCS buckets and exposed services.

    • Tools: GCPBucketBrute, CloudEnum.

  • Cloud Metadata Exploitation: Attempt to access instance metadata for cloud provider details.

    • Tools: curl (e.g., http://169.254.169.254/), CloudSploit.

Container & Virtualization

  • Docker/Kubernetes: Enumerate containers, pods, and misconfigured orchestrators.

    • Tools: kubectl, docker, Kube-Hunter, Trivy.

  • Virtualisation: Identify hypervisors (VMware, Hyper-V) and their configurations.

    • Tools: nmap --script=vmware*, virt-what.

Vulnerability Scanning

Automated Vulnerability Scans

  • General Scanners: Identify CVEs and misconfigurations.

    • Tools: Nessus, OpenVAS, Nexpose.

  • Web Scanners: Focus on web-specific vulnerabilities (XSS, SQLi, etc.).

    • Tools: Nikto, OWASP ZAP, Burp Suite Pro.

  • Container Scanners: Scan Docker images and Kubernetes clusters for vulnerabilities.

    • Tools: Trivy, Clair, Anchore.

  • Nmap NSE Scripts: Run vulnerability-specific scripts.

    • Tools: nmap --script=vuln.

Manual Vulnerability Checks

  • Validate automated findings manually.

  • Test for business logic flaws, authentication bypasses, and privilege escalation.

  • Tools: Burp Suite, Postman, sqlmap.

External Intelligence & OSINT

External Recon

  • Shodan/Censys: Identify exposed devices, services, and IoT endpoints.

    • Tools: Shodan CLI, Censys CLI.

  • Code Repositories: Search for leaked credentials, API keys, or sensitive data in GitHub, GitLab, or Bitbucket.

    • Tools: GitRob, TruffleHog, GitLeaks.

  • Pastebin & Dark Web: Check for leaked credentials or data dumps.

    • Tools: Pastebin Scrapers, OnionScan.

Mobile & IoT Enumeration

  • Mobile Apps: Decompile APKs/IPAs and analyse APIs.

    • Tools: MobSF, Frida, Apktool, JD-GUI.

  • IoT & Firmware: Enumerate Bluetooth, Zigbee, or firmware vulnerabilities.

    • Tools: Binwalk, Firmadyne, BlueZ.

Infrastructure Components

  • Firewall & IDS/IPS: Detect and fingerprint security devices.

    • Tools: nmap --script=firewall*, hping3.

  • VPN & Load Balancers: Identify VPN endpoints and load balancer configurations.

    • Tools: ike-scan, nmap --script=http-vhosts.

  • WAF Detection: Identify Web Application Firewalls and their rules.

    • Tools: wafw00f, WhatWaf.

Automation & Notes

  • Automated Recon Tools: Run comprehensive recon frameworks for efficiency.

    • Tools: Recon-ng, SpiderFoot, AutoRecon, Sn1per.

  • Notes & Observations: Document anomalies, hidden parameters, error messages, and potential attack vectors.

    • Tools: Obsidian, CherryTree, Notion.

Last updated