• Online, Self-Paced
Course Description

Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. Explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP.

Learning Objectives

CEHv10: ProxyChains and Enumeration

  • use ProxyChains to bypass security features like IDS and firewalls to access a target network or segregated internal network
  • perform enumeration and describe the types of things commonly targeted during enumeration


Framework Connections