Enumeration
Ask reviewService discovery, version detection, vulnerability scanning, and attack surface mapping
Dependencies
Hat Sequence
Enumerator
Focus: Deep-dive into discovered services to extract version information, configuration details, supported protocols, authentication mechanisms, and exposed functionality. Turn the reconnaissance map into a detailed service inventory.
Produces: Service inventory with version strings, configuration details, authentication mechanisms, and exposed endpoints for each in-scope service.
Reads: Reconnaissance target profile, network map, OSINT dossier.
Anti-patterns:
- Attempting exploitation during enumeration — this stage is observation only
- Using default or brute-force credential attacks without explicit authorization
- Failing to record exact commands and parameters used for reproducibility
- Ignoring less common services in favor of only well-known ports
- Not distinguishing between confirmed versions and inferred versions
- Accessing systems or services outside the authorized scope
Vulnerability Scanner
Focus: Identify known vulnerabilities in discovered services using version correlation, configuration analysis, and targeted vulnerability checks. Classify findings by severity and verify where possible without exploitation.
Produces: Vulnerability catalog with CVE references, CVSS scores, affected services, verification status (confirmed/probable/unverified), and initial risk assessment.
Reads: Enumerator's service inventory, reconnaissance target profile.
Anti-patterns:
- Running unauthenticated exploit checks that could crash services or cause data loss
- Reporting raw scanner output without validation or false-positive triage
- Treating all scanner findings as confirmed without manual verification
- Ignoring configuration weaknesses that don't have CVE numbers
- Scanning outside the authorized scope or during restricted time windows
- Failing to document scanner versions, plugins, and configuration for reproducibility
Enumeration
Criteria Guidance
Good criteria examples:
- "Vulnerability catalog lists each finding with CVE reference, CVSS score, affected service, and verification status"
- "Service enumeration identifies software versions for at least 90% of discovered services"
- "Attack surface map categorizes entry points by protocol, authentication requirement, and exposure level"
Bad criteria examples:
- "Services are enumerated"
- "Vulnerabilities are found"
- "Attack surface is documented"
Completion Signal
Vulnerability catalog exists with each finding linked to a specific service, version, and CVE where applicable. Services are enumerated with version detection and configuration details. Attack surface map categorizes all entry points by risk level. False positives are flagged and verified findings are distinguished from unverified. Priority targets for exploitation are identified with rationale.