We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Defense Evasion with ProxyChains

Ricardo Reimao

Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.

Read more

Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.

Virtually every company has a at least a firewall solution to prevent hackers from accessing internal servers. As a red team specialist, you job is to simulate a real attack and try to bypass such defense mechanisms. In this course, Defense Evasion with ProxyChains, you will learn how to bypass network defense tools by tunneling the traffic through compromised machines. First, you will explore what network defense evasion is and how ProxyChains can help you to accomplish that. Then, you will see how to obfuscate your real IP address by using ProxyChains and the TOR network. Finally, you will learn how to bypass network segmentation and firewall solutions by using ProxyChains to re-route your traffic through an already compromised machine. This course covers a tactic from the MITRE ATT&CK framework: Network Boundary Bridging (T1599).

ProxyChains is a tool that forces any TCP connection made by any given application to go through proxies such as TOR. This allows users to bypass network security measures and evade detection.

In this cyber security course, you will learn how to use ProxyChains and TOR to evade network defense tools.

TOR is a free and open-source software for enabling anonymous communication. It directs internet traffic through a free, worldwide, volunteer overlay network, that consists of more than seven thousand relays that conceal a user's location and usage from anyone conducting network surveillance.

This course is for people who want to learn how to use ProxyChains and TOR to evade network security tools.

Some popular network security tools are: Wireshark, Metasploit, Nessus, Aircrack, Snort, Cain and Abel, Argus, Nagios, Tcpdump, and Splunk.

Enroll now

What's inside

Syllabus

Course Overview (Tool Introduction)
Evading Defense Mechanisms with ProxyChains
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores ProxyChains, a tool that enhances network security in companies
Emphasizes using ProxyChains for evading defense mechanisms, a skill that most red team specialists should possess
Provides hands-on training on bypassing network segmentation and firewalls using ProxyChains
Offers familiarity with the MITRE ATT&CK framework, a widely recognized cybersecurity standard
Covers essential topics in network security, ensuring a strong foundation for cybersecurity professionals

Save this course

Save Defense Evasion with ProxyChains to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Defense Evasion with ProxyChains. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Defense Evasion with ProxyChains will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are key in protecting a company's computer systems and networks from cyberattacks and other security breaches. They play a crucial role in developing, implementing, and monitoring security measures to prevent security incidents. The course's focus on bypassing network defense tools with ProxyChains is directly applicable to the role as it helps analysts better understand security measures and how to evade them. This enables them to effectively test the strength of the company's security measures and identify vulnerabilities that need to be addressed.
Network Security Engineer
Network Security Engineers design, implement, and maintain an organization's computer networks, including security measures to protect against unauthorized access and attacks. Understanding how to bypass network defense tools, as covered in this course, is crucial for these engineers. It allows them to identify weaknesses in network security and develop effective strategies to mitigate and respond to security threats.
Security Architect
Security Architects are responsible for designing, implementing, and maintaining security measures for an organization's computer systems and networks. The course's focus on network defense evasion with ProxyChains provides valuable insights into potential security loopholes and how to avoid them. This knowledge helps Security Architects create more robust and effective security architectures, protecting the organization's data and systems from cyber threats.
Threat Intelligence Analyst
Threat Intelligence Analysts gather and analyze information on potential cyber threats, including malware, phishing attacks, and hacking techniques. By understanding how to bypass network defense tools, as covered in this course, Threat Intelligence Analysts can stay ahead of the curve and identify emerging threats more effectively. This helps organizations stay informed about potential threats and develop proactive defense strategies.
Ethical Hacker
Ethical Hackers use their knowledge of computer systems and networks to identify vulnerabilities and improve security. The course's emphasis on bypassing network defense tools provides Ethical Hackers with practical experience in evading security measures and identifying potential entry points for attackers. This knowledge is vital for Ethical Hackers as it allows them to conduct more thorough and effective security audits.
Malware Analyst
Malware Analysts investigate and analyze malicious software, such as viruses, worms, and trojans. Understanding how to bypass network defense tools, as discussed in this course, can assist Malware Analysts in detecting and analyzing malware that may have evaded initial security measures. This knowledge enables them to develop more effective malware detection and mitigation strategies.
Network Administrator
Network Administrators manage and maintain computer networks, ensuring their smooth operation and security. The course's focus on bypassing network defense tools can provide Network Administrators with valuable insights into potential security vulnerabilities and how to address them. This knowledge enhances their ability to implement and maintain effective security measures, protecting the organization's network from cyber threats.
Security Consultant
Security Consultants advise clients on how to improve their cybersecurity posture and mitigate risks. By understanding how to bypass network defense tools, as covered in this course, Security Consultants can provide more informed advice and recommendations to their clients. This knowledge helps them identify potential security gaps, develop effective security strategies, and enhance the overall security of organizations.
Incident Responder
Incident Responders handle and mitigate cybersecurity incidents, such as data breaches and ransomware attacks. The course's focus on evading network defense tools can provide Incident Responders with valuable insights into how attackers may bypass security measures and gain access to systems. This knowledge enables them to develop more effective incident response strategies and quickly contain and mitigate the impact of security incidents.
Penetration Tester
Penetration Testers identify vulnerabilities in computer systems and networks by simulating cyberattacks. The course's focus on bypassing network defense tools is directly relevant to the role as it provides Penetration Testers with practical experience in evading security measures and identifying potential entry points for attackers. This knowledge enables them to conduct more thorough and effective penetration tests.
Security Operations Center Analyst
Security Operations Center Analysts monitor and analyze security events and alerts to identify and respond to cybersecurity threats. The course's focus on bypassing network defense tools can provide Security Operations Center Analysts with valuable insights into potential security loopholes and how to avoid them. This knowledge enables them to better detect and respond to security incidents.
Forensic Analyst
Forensic Analysts investigate and analyze digital evidence in the context of cybercrimes. The course's focus on evading network defense tools can provide Forensic Analysts with valuable insights into how attackers may bypass security measures and gain access to systems. This knowledge enables them to conduct more effective forensic investigations and uncover digital evidence that may have been hidden or obscured using ProxyChains.
Privacy Analyst
Privacy Analysts ensure that an organization's data collection and processing practices comply with privacy regulations and ethical standards. The course's focus on bypassing network defense tools may be indirectly relevant to the role as it provides insights into potential privacy risks associated with network traffic monitoring and analysis. This knowledge can help Privacy Analysts develop more effective privacy policies and procedures.
Compliance Analyst
Compliance Analysts ensure that an organization's operations are in compliance with applicable laws, regulations, and industry standards. The course's focus on bypassing network defense tools may be indirectly relevant to the role as it provides insights into potential security risks associated with network traffic monitoring and analysis. This knowledge can help Compliance Analysts develop more effective compliance programs and ensure that the organization meets its regulatory obligations.
Cybersecurity Risk Analyst
Cybersecurity Risk Analysts evaluate cybersecurity risks and develop strategies to mitigate them. The course's focus on bypassing network defense tools may be indirectly relevant to the role as it provides insights into potential security risks associated with network traffic monitoring and analysis. This knowledge can help Cybersecurity Risk Analysts better assess risks and develop more effective risk mitigation strategies.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Defense Evasion with ProxyChains.
Provides a comprehensive overview of penetration testing techniques and tools, including how to use ProxyChains to bypass network defenses.
Provides a detailed overview of the Metasploit penetration testing framework, which can be used in conjunction with ProxyChains to evade network defenses.
Provides a detailed overview of the Nessus vulnerability scanner, which can be used in conjunction with ProxyChains to evade network defenses.
Provides a detailed overview of network security tools, including ProxyChains, and how to use them to defend against attacks.
Provides a detailed overview of hacking techniques, including how to use ProxyChains to bypass network defenses.
Provides a detailed overview of network security technologies, including how to use ProxyChains to bypass network defenses.
Provides a broad overview of network security, including how to use ProxyChains to bypass network defenses.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Defense Evasion with ProxyChains.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser