With a target map in hand, you move from port discovery to deep enumeration: pulling service banners, walking directory trees, extracting user lists, and identifying software versions that might be vulnerable.
Vulnerability scanners compare discovered services against databases of known CVEs. Nessus (Tenable) and OpenVAS (Greenbone) are industry standards. They rank findings by CVSS score. Scanners find low-hanging fruit fast but produce false positives — every finding must be manually validated.
Web apps deserve dedicated tools. Gobuster brute-forces directories and virtual hosts. Nikto scans for 6,700+ known web server issues: outdated software, misconfigured headers, default credentials, and exposed sensitive files like /admin, /.git, and /phpinfo.php.
Windows networks expose SMB (port 445) and NetBIOS (139). Tools like enum4linux-ng and smbclient enumerate shares, users, groups, and policies without authentication. This data feeds directly into password attacks and lateral movement planning.
# Nmap NSE scripts for deeper enumeration
nmap -sV --script=vuln 192.168.1.100
nmap -p 445 --script smb-enum-users 192.168.1.100
# Web directory brute-force
gobuster dir -u http://192.168.1.100 -w /usr/share/wordlists/dirb/common.txt
# Nikto web scanner
nikto -h http://192.168.1.100
# SMB enumeration
enum4linux-ng -A 192.168.1.100
smbclient -L //192.168.1.100 -N
# Banner grabbing
nc -nv 192.168.1.100 22
telnet 192.168.1.100 80
Run a full enumeration against Metasploitable 2. Create a prioritized findings list ranking the top 5 vulnerabilities by exploitability and potential impact.