5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker v10

Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. Explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP.



Objectives

CEHv10: ProxyChains and Enumeration

  • use ProxyChains to bypass security features like IDS and firewalls to access a target network or segregated internal network
  • perform enumeration and describe the types of things commonly targeted during enumeration