# Enum4Linux

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2FQQRCC0A7gaRkkt40RIQi%2Fimage.png?alt=media&#x26;token=75a9a55f-6d72-4d7c-8853-971c2390e916" alt="" width="384"><figcaption><p><em>Image Source:</em><a href="https://www.kali.org/tools/enum4linux/"><em>https://www.kali.org/tools/enum4linux/</em></a></p></figcaption></figure>

{% hint style="warning" %}
Use what I'm about to say in this article only for the right purposes, such as raising security awareness and improving the security posture of your environments. I do not accept any responsibility for other uses.
{% endhint %}

Enum4Linux is a tool used to collect information from Windows and Samba systems. Some information that Enum4Linux can collect;

&#x20;     ->Shared files and directories of the target system, \
&#x20;     ->Working users and groups of the target system, \
&#x20;     ->NetBIOS name and IP address of the target system, \
&#x20;     ->Operating system version of the target system, \
&#x20;     ->Security settings of the target system.

Enum4linux is a tool written in Perl language used in collecting information in penetration tests. So let's talk about how we can use it.

### Requirements

&#x20;     -> Kali Linux\
&#x20;     ->Metasploitable

First of all, deploy ***Metasploitable***, a vulnerable Linux variant, to your environment. Metasploitable's default username and password is "*<mark style="color:yellow;">**msfadmin**</mark>*". Log in with this information.

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2F7iwLyUOEdVbeiAoFhuPV%2Fimage.png?alt=media&#x26;token=f43418c8-b8a6-4824-90b4-03f34a9fb18b" alt="" width="540"><figcaption><p><em>Metasploitable Terminal</em></p></figcaption></figure>

Metasploitable does not have a graphical interface by default and I used Metasploitable in one of my previous articles, "[***Exploiting the Shellshock Vulnerability and Protecting Yourself against It***](https://alirodoplu.gitbook.io/ali-rodoplu/offensive/exploiting-the-shellshock-vulnerability-and-protecting-yourself-against-it)", where I explained another vulnerability, the Shellshock vulnerability.

Let's see which ports are open by starting an nmap scan from our Attacker machine.

```bash
nmap -Pn <Target-IP>
```

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2FVcg6PmIQsRe610apXALX%2Fimage.png?alt=media&#x26;token=4e2148f3-e0ea-4bbf-86c1-b5552ad51ae7" alt="" width="563"><figcaption></figcaption></figure>

As we see, our SMB ports are open on the target machine. This means that we can continue to look for vulnerabilities in these ports with enum4linux.

The *<mark style="color:yellow;">**-U**</mark>* parameter is used to list the users on the target.

```bash
enum4linux -U <Target-IP>
```

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2FjiM8yUH96gdvdntpn22h%2Fimage.png?alt=media&#x26;token=ba6f8ba5-b62f-4b40-8d93-f5e45897e903" alt="" width="563"><figcaption><p><em>Kali Terminal</em></p></figcaption></figure>

We can see the status of shared environments by using the *<mark style="color:yellow;">**-S**</mark>* parameter.

```bash
enum4linux -S <Target-IP>
```

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2FlhG3hBvwoHRSgNgj59w3%2Fimage.png?alt=media&#x26;token=291d9ac4-a9eb-4a34-a783-33a152f55cd9" alt=""><figcaption><p><em>Kali Terminal</em></p></figcaption></figure>

As you can see, we understand that we have access to the *<mark style="color:yellow;">**\<Target-IP>/tmp**</mark>* directory and have permission to list it.

We can see the status of password policy informations by using the *<mark style="color:yellow;">**-P**</mark>* parameter.

```bash
enum4linux -P <Target-IP>
```

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2F5TwzJziRvN91An7uON3S%2Fimage.png?alt=media&#x26;token=5e292a8d-90cc-4dd6-8ef8-c1daa1959f69" alt=""><figcaption><p><em>Kali Terminal</em></p></figcaption></figure>

We can check the status of NetBIOS  services using the *<mark style="color:yellow;">**-n**</mark>* parameter.

```bash
enum4linux -n <Target-IP>
```

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2FAR2ohQTygTSr5ooW3EBn%2Fimage.png?alt=media&#x26;token=bc2800d4-c638-4b62-86cc-8dbf27dfbdf2" alt=""><figcaption><p><em>Kali Terminal</em></p></figcaption></figure>

We can check the all SIDs using the *<mark style="color:yellow;">**-r**</mark>* parameter.

```bash
enum4linux -r <Target-IP>
```

<figure><img src="https://2451201392-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSXlq8GYyAbVnvbRZogU3%2Fuploads%2FUGIjNZYDAk5Wj4tEbabl%2Fimage.png?alt=media&#x26;token=2d10882b-e8c3-4b6a-9ce7-703d097baea7" alt=""><figcaption><p><em>Kali Terminal</em></p></figcaption></figure>

### **What needs to be done to avoid such scanning and information acquisition attacks;**

->Turn off unused services,\
->Staying away from vulnerable protocols,\
->Use strong passwords,\
->Delete unnecessary users from the system,

### **Resources Used**

<https://null-byte.wonderhowto.com/how-to/enumerate-smb-with-enum4linux-smbclient-0198049/>
