Ethical Hacker: ProxyChains & Enumeration

Ethical Hacker 10    |    Intermediate
  • 2 videos | 49m 31s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 21 users Rating 4.5 of 21 users (21)
Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. During this course you will explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam.

WHAT YOU WILL LEARN

  • Use proxychains to execute commands anonymously
    describe the configuration file used by proxychains
    Identify the enumeration command to use on linux
  • describe the purpose of enumeration
    use the correct enumeration tool to accomplish the job

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 63 users Rating 4.6 of 63 users (63)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.8 of 31 users Rating 4.8 of 31 users (31)
Rating 4.5 of 28 users Rating 4.5 of 28 users (28)