Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.
Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.
Virtually every company has a at least a firewall solution to prevent hackers from accessing internal servers. As a red team specialist, you job is to simulate a real attack and try to bypass such defense mechanisms. In this course, Defense Evasion with ProxyChains, you will learn how to bypass network defense tools by tunneling the traffic through compromised machines. First, you will explore what network defense evasion is and how ProxyChains can help you to accomplish that. Then, you will see how to obfuscate your real IP address by using ProxyChains and the TOR network. Finally, you will learn how to bypass network segmentation and firewall solutions by using ProxyChains to re-route your traffic through an already compromised machine. This course covers a tactic from the MITRE ATT&CK framework: Network Boundary Bridging (T1599).
ProxyChains is a tool that forces any TCP connection made by any given application to go through proxies such as TOR. This allows users to bypass network security measures and evade detection.
In this cyber security course, you will learn how to use ProxyChains and TOR to evade network defense tools.
TOR is a free and open-source software for enabling anonymous communication. It directs internet traffic through a free, worldwide, volunteer overlay network, that consists of more than seven thousand relays that conceal a user's location and usage from anyone conducting network surveillance.
This course is for people who want to learn how to use ProxyChains and TOR to evade network security tools.
Some popular network security tools are: Wireshark, Metasploit, Nessus, Aircrack, Snort, Cain and Abel, Argus, Nagios, Tcpdump, and Splunk.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.