Enumeration is often the most important step in a penetration test. Imagine you have just gotten a shell back from an exploit. What commands will you run to enumerate the host, and when are you 'done'?
A. Commands: ls, ps, ifconfig. You are 'done' when you have retrieved basic system information.
B. Commands: netstat, who, w. You are 'done' when you have identified all active network connections and logged-in users.
C. Commands: uname -a, cat /etc/passwd, cat /etc/group. You are 'done' when you have gathered detailed system information, user accounts, and group memberships.
D. Commands: ping, traceroute, nmap. You are 'done' when you have mapped the network topology and identified all active hosts and services.