• Online, Self-Paced
Course Description

Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. Explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP.

Learning Objectives

CEHv10: ProxyChains and Enumeration

  • use ProxyChains to bypass security features like IDS and firewalls to access a target network or segregated internal network
  • perform enumeration and describe the types of things commonly targeted during enumeration

 

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations
  • Cybersecurity Management
  • Exploitation Analysis
  • Threat Analysis
  • Vulnerability Assessment and Management