Alan Lam
Alan Lam
  • Видео 13
  • Просмотров 1 377
Deploy T-Pot Honeypot to collect malware files and monitor hackers' activities (Noise reduction Ver)
This T-Pot is deployed on Cloud platform to collect malware files and monitor hackers' activities. This demo show you how to review the hackers' download files and hackers' keystrokes after their break-ins.
You can get more updated info from my project at github.com/alanshlam/HoneyNet
Просмотров: 13

Видео

Demo of HTTPS traffic intercept by MITM attack and snoop user password (noise reduction version)
Просмотров 4028 дней назад
This video demonstrate how to intercept HTTPS traffic by ARP poisoning in MITM attack. Normally, HTTPS network packets are encrypted by a session key between the client and web server. An attacker cannot decrypt the HTTPS traffic without the session key. However, if the attacker can redirect the victim's HTTPS traffic to their managed host (e.g., by DNS hijack or ARP poisoning in a LAN), they c...
T-Pot Attack Map: SMB attack from Asia
Просмотров 242 месяца назад
Show you the T-Pot Attack Map in 2 minutes time. This video demonstrates that an attacker from Vietnam continuously attacked the honeypot's SMB. You can get more info from my project at github.com/alanshlam/HoneyNet
T-Pot Attack Map: SMB attack from South America
Просмотров 252 месяца назад
Show you the T-Pot Attack Map in 2 minutes time. This video demonstrates that an attacker from Brazil continuously attacked the honeypot's SMB. You can get more info from my project at github.com/alanshlam/HoneyNet
Network monitoring and debugging with iperf3, MRTG, NTOP, hping3, traceroute, and Wireshark.
Просмотров 232 месяца назад
This video show you how to measure network throughput and network latency, monitor network traffic, and debug network route with the tools of iperf3, MRTG, NTOP, hping3, traceroute, and Wireshark. You may see my research projects at github.com/alanshlam
Dump a website database by Time-based Blind SQL Injection
Просмотров 402 месяца назад
The video demonstrates how to dump a website database information, including user password hashes, using Time-based Blind SQL Injection. This type of injection relies on the database pausing for a specified amount of time before returning results, indicating successful query execution. The attacker enumerates each letter of the desired data using logic that causes the database to wait if a cond...
Block SQL injection attack by Suricata IPS
Просмотров 422 месяца назад
This video show you how Suricata Intrusion Prevention System (IPS) can block SQL injection attack in real-time. You can download the demo materials from github.com/alanshlam/Pentest/tree/main/ips You can get more info from my project at github.com/alanshlam/Pentest
Penetration Testing with Nmap and Metasploit
Просмотров 312 месяца назад
This video shows you how Nmap and Metasploit can help in Pentest You can get more info from my project at github.com/alanshlam/Pentest
Deploy T-Pot Honeypot to collect malware files and monitor hackers' activities
Просмотров 702 месяца назад
This T-Pot is deployed on Cloud platform to collect malware files and monitor hackers' activities. This demo show you how to review the hackers' download files and hackers' keystrokes after their break-ins. You can get more updated info from my project at github.com/alanshlam/HoneyNet
Demonstration of HTTPS traffic intercept by MITM attack and snoop victim user password
Просмотров 782 месяца назад
This video demonstrate how to intercept HTTPS traffic by ARP poisoning in MITM attack. Normally, HTTPS network packets are encrypted by a session key between the client and web server. An attacker cannot decrypt the HTTPS traffic without the session key. However, if the attacker can redirect the victim's HTTPS traffic to their managed host (e.g., by DNS hijack or ARP poisoning in a LAN), they c...
Network Forensics by Wireshark and tcpdump
Просмотров 472 месяца назад
Demonstrate how to analyze attack network packets, such as ICMP Smurf DDoS attack, DNS hijack, HTTPS intercept by MITM attack, extract hacker commands after SMB break-in. Below video demonstrate how to intercept HTTPS traffic by ARP poisoning in MITM attack. ruclips.net/video/E_E2cYAhyiU/видео.html You can download the above network packet pcap files from github.com/alanshlam/HoneyNet/tree/main...
《靜觀自得-生命的祝福》新書分享會 (音量加強版本)
Просмотров 4173 года назад
近年來,靜觀修習備受關注,很多實證研究指出靜觀能助人減壓,提升身心健康,因此願意修讀八週靜觀課程的人與日俱增。 在英語世界,有不少靜觀的入門書籍。然而,在華語世界,這樣的書籍不多。想了解及學習靜觀,只能依賴英語原著或譯本。但這些原著或譯本未必切合華人社會的境況,也無法從中華文化中吸收傳統的靜觀養分。 有見及此,致力推動靜觀教育和研究的林瑞芳教授,執筆撰寫本書,深入淺出整合生活常識、研究結果、學術理論,為讀者提供一本貼近生活、又包含科學實證和中華文化承傳的靜觀入門讀本。 配合書中提及的學習靜觀手機程式,隨時隨地就能練習,感受身心轉化、成長的歷程。 作者介紹︰ 林瑞芳 香港大學社會科學學院教授,獲明尼蘇達大學博士學位、國際學校心理學會傑出國際學者獎、香港大學傑出教學獎及知識交流獎。現為香港大學賽馬會「樂天心澄」靜觀校園文化行動總監,致力推動靜觀的教育和研究,以提升學生、教師和家長的身心健...
《靜觀自得-生命的祝福》新書分享會
Просмотров 5303 года назад
近年來,靜觀修習備受關注,很多實證研究指出靜觀能助人減壓,提升身心健康,因此願意修讀八週靜觀課程的人與日俱增。 在英語世界,有不少靜觀的入門書籍。然而,在華語世界,這樣的書籍不多。想了解及學習靜觀,只能依賴英語原著或譯本。但這些原著或譯本未必切合華人社會的境況,也無法從中華文化中吸收傳統的靜觀養分。 有見及此,致力推動靜觀教育和研究的林瑞芳教授,執筆撰寫本書,深入淺出整合生活常識、研究結果、學術理論,為讀者提供一本貼近生活、又包含科學實證和中華文化承傳的靜觀入門讀本。 配合書中提及的學習靜觀手機程式,隨時隨地就能練習,感受身心轉化、成長的歷程。 作者介紹︰ 林瑞芳 香港大學社會科學學院教授,獲明尼蘇達大學博士學位、國際學校心理學會傑出國際學者獎、香港大學傑出教學獎及知識交流獎。現為香港大學賽馬會「樂天心澄」靜觀校園文化行動總監,致力推動靜觀的教育和研究,以提升學生、教師和家長的身心健...

Комментарии

  • @alanshlam
    @alanshlam 3 года назад

    如果覺得聲量細, 可以嘗試以下版本 ruclips.net/video/8K-26tAw82I/видео.html

    • @lclam5559
      @lclam5559 3 года назад

      我收看了音量加強版,音效好好

  • @faridagus2789
    @faridagus2789 3 года назад

    👍👍👍