Skip to content

A CEH v12-based academic project focused on network security enumeration. Covers practical techniques, tool demonstrations, and real-world reconnaissance scenarios.

Notifications You must be signed in to change notification settings

WanThinnn/Network-Security-Enumeration

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Network Security Enumeration

Overview

This repository contains the final project for NT140 - Network Security course at UIT (University of Information Technology). The project is based on CEH v12 (Certified Ethical Hacker version 12) curriculum, specifically focusing on the Enumeration module. It demonstrates various enumeration techniques, network reconnaissance methods, and information gathering tools used in ethical hacking.

Project Scope

The project focuses on practical enumeration techniques following CEH v12 methodology:

  • Network Enumeration: Discovering live hosts, open ports, and running services
  • NetBIOS Enumeration: Extracting information from Windows networks using NBTStat
  • SMTP Enumeration: Identifying mail server information and user accounts
  • NFS Enumeration: Discovering and analyzing Network File System shares
  • Service Enumeration: Using NSE scripts for automated service discovery and fingerprinting
  • Information Gathering: Systematic approach to reconnaissance and target profiling

Repository Structure

Network-Security-Enumeration/
├── docs/                   # Project documentation
│   ├── NT140.P12.ANTT_Nhom-6_Bao-cao-cuoi-ky.docx
│   └── NT140.P12.ANTT_Nhom-6_Bao-cao-cuoi-ky.pdf
├── demo/                   # Demonstration videos
│   ├── demo_NFS.mp4       # NFS (Network File System) demonstration
│   ├── nbtstat_enumerator.mp4  # NetBIOS enumeration demo
│   ├── nse_script.mp4     # Nmap Scripting Engine demonstration
│   ├── smtp_p1.mp4        # SMTP protocol analysis (Part 1)
│   └── smtp_p2.mp4        # SMTP protocol analysis (Part 2)
└── slide/                  # Presentation materials
    └── NT140.P12.ANTT.pptx

Key Components

Enumeration Tools and Techniques (CEH v12 Module)

NetBIOS Enumeration

  • NBTStat Enumerator: Implementation of NetBIOS name table enumeration for Windows network discovery
  • Null Session Attacks: Techniques for extracting user information through anonymous connections
  • Share Enumeration: Discovery and analysis of network shares

Service Enumeration

  • NSE Scripts: Custom Nmap Scripting Engine implementations for automated service detection
  • Banner Grabbing: Service version detection and fingerprinting techniques
  • Port Scanning: Comprehensive port discovery and service identification

Protocol-Specific Enumeration

  • NFS Enumeration: Network File System share discovery and permission analysis
  • SMTP Enumeration: Mail server reconnaissance including user enumeration via VRFY and EXPN commands
  • DNS Enumeration: Domain information gathering and zone transfer attempts

Practical Demonstrations

The enumeration techniques are demonstrated through real-world scenarios following CEH v12 methodology:

  • Step-by-step enumeration procedures
  • Tool usage and command syntax
  • Result interpretation and analysis
  • Countermeasures and defense strategies

Documentation

Complete project documentation is available in the docs/ folder, including:

  • Detailed technical report (PDF format)
  • Project methodology and findings
  • Security recommendations and best practices

Technical Requirements

This project implements enumeration techniques from CEH v12 curriculum using:

  • Nmap: Network discovery and port scanning
  • NSE (Nmap Scripting Engine): Automated enumeration scripts
  • NBTStat: NetBIOS information gathering
  • Command-line tools: Various enumeration utilities
  • Virtual lab environments: Controlled testing environments for safe enumeration practice

CEH v12 Learning Objectives

This project addresses key learning objectives from the CEH v12 Enumeration module:

  • Understanding different enumeration techniques and their applications
  • Implementing systematic information gathering methodologies
  • Using automated tools for efficient reconnaissance
  • Identifying security weaknesses through enumeration
  • Developing countermeasures against enumeration attacks

Academic Context

Course: NT140 - Network Security
Institution: University of Information Technology (UIT)
Project Type: Final Course Project
Team: Group 6

Usage Notes

The enumeration techniques and tools demonstrated in this repository are intended for:

  • Educational purposes in accordance with CEH v12 curriculum
  • Authorized penetration testing and security assessments
  • Controlled lab environments with proper authorization
  • Understanding defensive security measures

Important: All enumeration activities should be conducted only on systems you own or have explicit written permission to test. Unauthorized enumeration may violate laws and regulations.

License

This project is part of academic coursework and is intended for educational purposes only.

About

A CEH v12-based academic project focused on network security enumeration. Covers practical techniques, tool demonstrations, and real-world reconnaissance scenarios.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published