Discover how to use ProxyChains to obfuscate your contact with a target network, bypassing security features like IDSs and firewalls. Explore enumeration concepts and how to perform enumeration on services like NetBIOS, SMTP, and SNMP.
CEHv10: ProxyChains and Enumeration
- use ProxyChains to bypass security features like IDS and firewalls to access a target network or segregated internal network
- perform enumeration and describe the types of things commonly targeted during enumeration