A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Glossary › Enumeration Attack
What is Enumeration Attack?
An enumeration attack involves probing systems or services to extract data such as usernames, device details, service banners, or directory information. Attackers use enumeration to plan targeted exploitation. In TPRM, vendors exposed to enumeration attacks may unknowingly leak information that helps attackers compromise shared environments.
FAQs
Why is enumeration dangerous?
It reveals details attackers use to plan intrusions.
Are enumeration attacks noisy?
Many generate detectable patterns but not always.
How can vendors defend against enumeration?
Disable unnecessary services and enforce strict access controls.
Responsible-AI TPRM Guide
Discover how risk teams apply AI responsibly to reduce third-party blind spots and stay audit-ready across global regulations.
Easier third-party onboarding. Seamless compliance. Complete risk control.