5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Ethical Hacker (CEH) v10
Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. During this course you will explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam.

Objectives

Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration

  • describe the configuration file used by proxychains
  • use proxychains to execute commands anonymously
  • describe the purpose of enumeration
  • identify the enumeration command to use on Linux
  • use the correct enumeration tool to accomplish the job