Virtually every company has a at least a firewall solution to prevent hackers from accessing internal servers. As a red team specialist, you job is to simulate a real attack and try to bypass such defense mechanisms. In this course, Defense Evasion with ProxyChains, you will learn how to bypass network defense tools by tunneling the traffic through compromised machines. First, you will explore what network defense evasion is and how ProxyChains can help you to accomplish that. Then, you will see how to obfuscate your real IP address by using ProxyChains and the TOR network. Finally, you will learn how to bypass network segmentation and firewall solutions by using ProxyChains to re-route your traffic through an already compromised machine.
This course covers a tactic from the MITRE ATT&CK framework: Network Boundary Bridging (T1599).
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview (Tool Introduction) Hey there. Welcome to the course, Defense Evasion with ProxyChains. In this cybersecurity tools course, you'll learn how to bypass network security tools using proxychains. Modern companies employ several network defense tools to stop attackers from breaking their perimeters. Virtually every company nowadays employs at least a firewall solution to prevent hackers from accessing their internal servers. In this course, we cover the proxychains tool, which allows you to reroute your traffic through proxies so then it can bypass firewalls and other network security tools. We start this course by discussing the main network security defense tools and how we can bypass them. Then in our first demo, you'll learn how to obfuscate your real IP address by using proxychains and the Tor network. After that, in our second demo, you'll learn how to bypass network segmentation and firewall solutions by using proxychains to reroute your traffic through an already compromised machine. So, whether you are trying to exploit a super secure network in a red team engagement or just testing the perimeter of your own company, join me in learning how to evade defense tools with proxychains, here at Pluralsight.