翻訳と辞書
Words near each other
・ Network documentation
・ Network domain
・ Network Driver Interface Specification
・ Network DVR
・ Network dynamics
・ Network economics
・ Network economy
・ Network effect
・ Network Effectiveness Ratio
・ Network element
・ Network emulation
・ Network Enabled Weapon
・ Network enclave
・ Network encryption cracking
・ Network engineering
Network enumeration
・ Network equipment provider
・ Network Equipment-Building System
・ Network era
・ Network Extrusion
・ Network File System
・ Network First
・ Network flow
・ Network for a New Culture
・ Network for Astronomy School Education
・ Network for Capacity Development in Nutrition
・ Network for Earthquake Engineering Simulation
・ Network for Education and Academic Rights
・ Network for Electronic Transfers
・ Network for Good


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Network enumeration : ウィキペディア英語版
Network enumeration
Network enumeration is a computing activity in which usernames and info on groups, shares, and services of networked computers are retrieved. It should not be confused with network mapping, which only retrieves information about which servers are connected to a specific network and what operating system runs on them.

Network Enumeration is the discovery of hosts/devices on a network. Network Enumeration tends to use overt discovery protocols such as ICMP and SNMP to gather information. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to fingerprint the Operating System of the remote host.
== Software ==
A network enumerator or network scanner' is a computer program used to retrieve usernames and info on groups, shares, and services of networked computers. This type of program scans networks for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a hacker who may use this info to exploit that network glitch to gain entry to the network or for other malicious activities. Ethical hackers often also use the information to remove the glitches and strengthen their network.
Malicious (or "black-hat") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
Network enumerators are often used by script kiddies for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, whois queries, zone transfers, ping sweeps, and traceroute can be performed.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Network enumeration」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.