Defense Evasion with ProxyChains

Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.
Course info
Level
Intermediate
Updated
Apr 20, 2021
Duration
20m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 20, 2021
Duration
20m
Description

Virtually every company has a at least a firewall solution to prevent hackers from accessing internal servers. As a red team specialist, you job is to simulate a real attack and try to bypass such defense mechanisms. In this course, Defense Evasion with ProxyChains, you will learn how to bypass network defense tools by tunneling the traffic through compromised machines. First, you will explore what network defense evasion is and how ProxyChains can help you to accomplish that. Then, you will see how to obfuscate your real IP address by using ProxyChains and the TOR network. Finally, you will learn how to bypass network segmentation and firewall solutions by using ProxyChains to re-route your traffic through an already compromised machine. This course covers a tactic from the MITRE ATT&CK framework: Network Boundary Bridging (T1599).

About the author
About the author

Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.

More from the author
Privilege Escalation with Rubeus
Intermediate
20m
May 18, 2021
Reconnaissance with OWASP Amass
Intermediate
19m
May 7, 2021
More courses by Ricardo Reimao
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview (Tool Introduction)
Hey there. Welcome to the course, Defense Evasion with ProxyChains. In this cybersecurity tools course, you'll learn how to bypass network security tools using proxychains. Modern companies employ several network defense tools to stop attackers from breaking their perimeters. Virtually every company nowadays employs at least a firewall solution to prevent hackers from accessing their internal servers. In this course, we cover the proxychains tool, which allows you to reroute your traffic through proxies so then it can bypass firewalls and other network security tools. We start this course by discussing the main network security defense tools and how we can bypass them. Then in our first demo, you'll learn how to obfuscate your real IP address by using proxychains and the Tor network. After that, in our second demo, you'll learn how to bypass network segmentation and firewall solutions by using proxychains to reroute your traffic through an already compromised machine. So, whether you are trying to exploit a super secure network in a red team engagement or just testing the perimeter of your own company, join me in learning how to evade defense tools with proxychains, here at Pluralsight.