Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. During this course you will explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam.

Expected Duration (hours)
0.8

Lesson Objectives

Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration

  • describe the configuration file used by proxychains
  • use proxychains to execute commands anonymously
  • describe the purpose of enumeration
  • identify the enumeration command to use on Linux
  • use the correct enumeration tool to accomplish the job
  • Course Number:
    it_spceh10tv_08_04_enus

    Expertise Level
    Intermediate