Defense Evasion with ProxyChains

Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.
Course info
Level
Intermediate
Updated
Apr 20, 2021
Duration
20m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 20, 2021
Duration
20m
Description

Virtually every company has a at least a firewall solution to prevent hackers from accessing internal servers. As a red team specialist, you job is to simulate a real attack and try to bypass such defense mechanisms. In this course, Defense Evasion with ProxyChains, you will learn how to bypass network defense tools by tunneling the traffic through compromised machines. First, you will explore what network defense evasion is and how ProxyChains can help you to accomplish that. Then, you will see how to obfuscate your real IP address by using ProxyChains and the TOR network. Finally, you will learn how to bypass network segmentation and firewall solutions by using ProxyChains to re-route your traffic through an already compromised machine. This course covers a tactic from the MITRE ATT&CK framework: Network Boundary Bridging (T1599).

Course FAQ
Course FAQ
What is ProxyChains?

ProxyChains is a tool that forces any TCP connection made by any given application to go through proxies such as TOR. This allows users to bypass network security measures and evade detection.

What will you learn in this cyber security course?

In this cyber security course, you will learn how to use ProxyChains and TOR to evade network defense tools.

What is TOR?

TOR is a free and open-source software for enabling anonymous communication. It directs internet traffic through a free, worldwide, volunteer overlay network, that consists of more than seven thousand relays that conceal a user's location and usage from anyone conducting network surveillance.

Who is this course for?

This course is for people who want to learn how to use ProxyChains and TOR to evade network security tools.

What are popular network security tools?

Some popular network security tools are: Wireshark, Metasploit, Nessus, Aircrack, Snort, Cain and Abel, Argus, Nagios, Tcpdump, and Splunk.

About the author
About the author

Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.

More from the author
Persistence with Impacket
Intermediate
20m
Sep 15, 2021
Planning and Scoping for CompTIA Pentest+
Intermediate
1h 46m
Jul 7, 2021
More courses by Ricardo Reimao
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview (Tool Introduction)
Hey there. Welcome to the course, Defense Evasion with ProxyChains. In this cybersecurity tools course, you'll learn how to bypass network security tools using proxychains. Modern companies employ several network defense tools to stop attackers from breaking their perimeters. Virtually every company nowadays employs at least a firewall solution to prevent hackers from accessing their internal servers. In this course, we cover the proxychains tool, which allows you to reroute your traffic through proxies so then it can bypass firewalls and other network security tools. We start this course by discussing the main network security defense tools and how we can bypass them. Then in our first demo, you'll learn how to obfuscate your real IP address by using proxychains and the Tor network. After that, in our second demo, you'll learn how to bypass network segmentation and firewall solutions by using proxychains to reroute your traffic through an already compromised machine. So, whether you are trying to exploit a super secure network in a red team engagement or just testing the perimeter of your own company, join me in learning how to evade defense tools with proxychains, here at Pluralsight.