CEHv10: ProxyChains and Enumeration


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. Explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP.



Expected Duration (hours)
0.8

Lesson Objectives

CEHv10: ProxyChains and Enumeration

  • use ProxyChains to bypass security features like IDS and firewalls to access a target network or segregated internal network
  • perform enumeration and describe the types of things commonly targeted during enumeration
  • Course Number:
    it_spceh10tv_08_enus

    Expertise Level
    Intermediate