Parrot CTFs for Teams

Build cybersecurity talent.

An interactive and guided skills development platform for corporate teams looking to master offensive, defensive, and general security domains.

Parrot CTFs for Education

Empower the next generation.

Comprehensive cybersecurity education platform designed for academic institutions to prepare students for real-world challenges.

Parrot CTFs for Students

Start your cybersecurity journey.

Self-paced learning platform with hands-on labs and structured content to help you master cybersecurity skills.

Compliance-Focused Penetration Testing

NIS2 Compliance - Penetration Testing & Auditing

NIS2 Compliance

Parrot CTFs helps companies across Europe meet and maintain NIS2 compliance through trusted, transparent, and repeatable penetration testing. Get detailed audit-ready reports, real-world risk insights, and full lifecycle support.

Our NIS2 compliance solution includes:

  • Real-world risk insights
  • Full lifecycle support
  • Comprehensive penetration testing
  • Detailed audit-ready reports

Hacking Glossary

A comprehensive glossary of hacking terms and concepts.

Explore hacking terms

Hacking Cheat Sheets

A collection of cheat sheets for various hacking techniques and tools.

Hang out

Help Center

FAQs, and troubleshooting tips.

Visit Help Center

Introduction to Parrot CTFs

A guide to getting started with Parrot CTFs.

Read Guide

From the Blog
report

New release: The latest on CVE-2025-29927 – NextJS Vulnerability

21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware

View vulnerability report
Why Parrot CTFs?

Join our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.

Get started with Parrot CTFs
Featured News

Level Up Your Active Directory Hacking: Parrot CTFs Now Hosts GOAD by Orange Cyberdefense

We’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.

Read more news
Store
Free Trial

Start a free trial

Experience our enterprise solutions with a 14-day free trial.

Get started
Book Demo

Book a demo

Let us show you how Parrot CTFs can help your organization.

Book now
Products
Business

Products we offer

NIS2 Compliance

NIS2 Compliance

Parrot CTFs helps companies across Europe meet and maintain NIS2 compliance through trusted, transparent, and repeatable penetration testing. Get detailed audit-ready reports, real-world risk insights, and full lifecycle support.

Our NIS2 compliance solution includes:

  • Comprehensive penetration testing
  • Detailed audit-ready reports
  • Real-world risk insights
  • Full lifecycle support
Resources

Hacking Glossary

A comprehensive glossary of hacking terms and concepts.

Explore hacking terms

Hacking Cheat Sheets

A collection of cheat sheets for various hacking techniques and tools.

Hang out

Help Center

FAQs, and troubleshooting tips.

Visit Help Center

Introduction to Parrot CTFs

A guide to getting started with Parrot CTFs.

Read Guide

From the Blog
report

New release: The latest on CVE-2025-29927 – NextJS Vulnerability

21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware

View vulnerability report
Company
Why Parrot CTFs?

Join our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.

Get started with Parrot CTFs
Featured News

Level Up Your Active Directory Hacking: Parrot CTFs Now Hosts GOAD by Orange Cyberdefense

We’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.

Read more news
Store

Enumeration Basics

Dive into the foundational aspects of enumeration in cybersecurity with our "Enumeration Basics" course. Designed for beginners and intermediate learners, this course provides a comprehensive introduction to the essential techniques and tools used in the enumeration process.

General

Fundamentals

Parrot CTFs academy course image

What is Enumeration?

Enumeration involves systematically mapping an application or system to gather as much information as possible. This process is vital for identifying system flaws, making enumeration an essential skill for any penetration tester. While manually browsing websites and applications and clicking on visible links can reveal some information, many links and pages might not be publicly accessible. These hidden areas are often less secure and more vulnerable to attacks.


 

Key Aspects of Enumeration

The following are some examples of what you will likely be looking for when enumeration an application. 

  • Usernames: Identifying user accounts and groups on a system.
  • Network Shares:  Discovering shared resources on a network.
  • Services: Identifying running services and their versions.
  • Hostnames: Discovering hostnames and domain names.
  • Network Interfaces: Identifying network interfaces and their configurations.
  • Banners: Capturing service banners to glean software versions and configurations.
  • Open Ports: Discovering open ports and the services running on them.
  • Configuration Files: Accessing and analyzing configuration files for sensitive information.
  • OSINT (Open Source Intelligence): Searching the internet for publicly available information.
  • Business Logic: Understanding how applications or systems work to identify potential flaws in their processes and rules.

There are two main types of enumeration: automated and manual. Both techniques are crucial and often used in combination to gather comprehensive information about an application. Automated tools can quickly scan for known vulnerabilities and configuration issues, while manual techniques allow for a more detailed and nuanced exploration of the system.

 

Types of Enumeration

Automated Enumeration:

  • Utilizes tools and scripts to scan systems quickly.
  • Efficient for covering large areas and identifying common vulnerabilities
  • Examples of tools: Nmap, Nessus, Nikto.

Manual Enumeration:

  • Involves a hands-on approach to explore systems.
  • Allows for deeper insight and identification of complex or subtle issues.
  • Techniques include manual browsing, custom scripts, and detailed analysis of system responses.


Many penetration testers combine manual and automated enumeration techniques to maximize the amount of information gathered. Automated scans can provide a broad overview, while manual methods can delve into specific areas revealed by these scans. A common rule of thumb is that there is never enough enumeration; the more information you have, the better prepared you are to identify and exploit vulnerabilities.

When testing an application, the goal is to understand it thoroughly enough to replicate its functionality. This deep understanding enables you to identify weaknesses that might not be apparent through superficial inspection. Comprehensive enumeration lays the groundwork for successful penetration testing, providing the insights needed to uncover and address potential security risks.

Ready to start hacking?

Join Parrot CTFs and access our hands-on hacking labs today!