Using BackTrack 4: Information Gathering: Route: netenum

netenum

Opening Instructions:

Netenum
netenum <destination> [timeout] [verbosity]
if timeout is >0, pings are used to enum

Purpose:

Netenum performs a quick (and dirty) ping sweep of the local network, producing a list of hosts as output. This is particularly handy, for instance, to pass to Nessus or nmap, or to call in a script or piped command. The security auditor will like this tool; the serious hacker probably will use something less detectable.

One interesting script-worthy feature is that you can use netenum to generate a list of IP addresses within a specified range simply by setting the timeout to 0. This may be handy for piping to another tool. If you specify a longer timeout, that timeout applies to the whole process, not individual pings, so what you’re really doing is specifying how long to keep doing ping sweeps.

Stage:

Information Gathering

Home Page:

http://www.vulnerabilityassessment.co.uk/netenum.htm

Tutorial:

http://www.question-defense.com/2010/06/01/backtrack-4-information-gathering-route-netenum-produce-lists-of-hosts-for-other-programs