# Enumeration

> **⚡ Prerequisites**
>
> * Basic familiarity with Linux and networks concepts
> * Footprinting and Scanning
>
> **📕 Learning Objectives**
>
> * Purpose of service enumeration
> * Enumeration on common and uncommon services and protocols
>
> **🔬 Training list - PentesterAcademy/INE Labs**
>
> `subscription required`
>
> * [SMB Servers Win Recon](https://attackdefense.com/listing?labtype=windows-recon\&subtype=windows-recon-smb)
> * [SMB Servers Network Recon](https://attackdefense.com/listing?labtype=network-recon\&subtype=recon-smb)
> * [FTP Servers Linux Recon](https://attackdefense.com/listing?labtype=linux-security-recon\&subtype=recon-ftp)
> * [SSH Servers Network Recon](https://attackdefense.com/listing?labtype=network-recon\&subtype=recon-ssh)
> * [IIS Servers Win Recon](https://attackdefense.com/listing?labtype=windows-recon\&subtype=windows-recon-iis)
> * [Webservers Network Recon](https://attackdefense.com/listing?labtype=network-recon\&subtype=recon-webserver)
> * [SQL Databases Linux Recon](https://attackdefense.com/listing?labtype=linux-security-recon\&subtype=linux-security-recon-sqldbs)
> * [SQL Databases Network Recon](https://attackdefense.com/listing?labtype=network-recon\&subtype=recon-sqldb)
> * [MSSQL Servers Win Recon](https://attackdefense.com/listing?labtype=windows-recon\&subtype=windows-recon-mssql)

A **server** is a computer program or device that provides a **service** to another computer program and its user, also known as the **client**. It accepts and responds to request made over a network. The term *server* can refer to a physical machine, a virtual machine or to software performing server services.

It can run various operating systems like Windows Server, Linux Server, macOS Server.

Servers need to be accessed remotely by multiple clients, so the server must *open* and accept connections on the listening *port* of the service.

Open port service bugs and vulnerabilities could expose the entire server to attackers.

Chech the common services recon here:

* [`SMB`](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/smb-enum)
* [`FTP`](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/ftp-enum)
* [`SSH`](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/ssh-enum)
* [`HTTP`](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/http-enum)
* [`MYSQL`](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/mysql-enum)
* [`SMTP`](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/smtp-enum)

🗒️ **Enumeration** is a critical phase in a pentest, used to identify information about in-scope assets, discovering potential attack vectors and vulnerabilities.

![Common Ports - by Jeremy Stretch](https://1996978447-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlhjuckuLbvBn36EoFL7P%2Fuploads%2Fgit-blob-8378a17a9294a1117cd1134c456761dbbde03bce%2Fimage-20230211104550784.png?alt=media)

***
