YoVDO

Defense Evasion with ProxyChains

Offered By: Pluralsight

Tags

Cybersecurity Courses Tor (The Onion Router) Courses Firewalls Courses Network Segmentation Courses Mitre Att&ck Framework Courses

Course Description

Overview

In this cyber security course you will learn how to use ProxyChains and TOR to re-route your network traffic and bypass security tools.

Virtually every company has a at least a firewall solution to prevent hackers from accessing internal servers. As a red team specialist, you job is to simulate a real attack and try to bypass such defense mechanisms. In this course, Defense Evasion with ProxyChains, you will learn how to bypass network defense tools by tunneling the traffic through compromised machines. First, you will explore what network defense evasion is and how ProxyChains can help you to accomplish that. Then, you will see how to obfuscate your real IP address by using ProxyChains and the TOR network. Finally, you will learn how to bypass network segmentation and firewall solutions by using ProxyChains to re-route your traffic through an already compromised machine. This course covers a tactic from the MITRE ATT&CK framework: Network Boundary Bridging (T1599).

Taught by

Ricardo Reimao

Related Courses

Security and Privacy in TOR Network
University of Colorado System via Coursera
The Complete Cyber Security Course : Anonymous Browsing!
Udemy
The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy
The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy
Hacker Ético Profissional com Kali Linux v2023
Udemy