Ethical Hacker: ProxyChains & Enumeration
Ethical Hacker 10
| Intermediate
- 2 Videos | 49m 31s
- Includes Assessment
- Earns a Badge
Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. During this course you will explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam.
WHAT YOU WILL LEARN
-
describe the configuration file used by proxychainsuse proxychains to execute commands anonymouslydescribe the purpose of enumeration
-
identify the enumeration command to use on Linuxuse the correct enumeration tool to accomplish the job
IN THIS COURSE
-
1.ProxyChains22m 29s
-
2.Enumeration27m 2s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.