runs all options apart from dictionary based share name guessing
list usernames
list windows shares
dictionary attack
enum4linux -s shares.txt target-ip
pull usernames from the default RID range (500-550,1000-1050)
pull usernames using a custom RID range
enum4linux -R 600-660 target-ip
view password policy
view OS info
list groups
if on domain, tried to get some LDAP info
-i flag any Printer info
NetBIOS info
run all simple enumeration
connect with user and password
enum4linux -u administrator -p password -U target-ip
verbose mode