Introduction
Imagine trying to find unlocked doors and windows in a large building before entering. In cybersecurity, scanning and enumeration help find open points and details about a computer network to understand its structure and weaknesses.
Imagine a person walking around a neighborhood checking which houses have open doors (scanning). Then, they look inside windows to see who lives there and what valuables are inside (enumeration).
┌─────────────┐ ┌───────────────┐
│ Network │──────▶│ Scanning │
│ Devices │ │(Find open │
│ │ │ ports/services)│
└─────────────┘ └───────────────┘
│
▼
┌───────────────┐
│ Enumeration │
│(Gather details│
│ about targets)│
└───────────────┘