- Видео 113
- Просмотров 202 727
IT Best Practice
США
Добавлен 9 янв 2022
What is Kali Linux? A Hands On Guide for Beginners
Curious about Kali Linux? In this beginner-friendly video, we dive into what Kali Linux is, why it's the go-to operating system for ethical hackers, and how security professionals use it. Watch as we explore its tools, features, and GUI in a hands-on demonstration. Whether you're new to cybersecurity or looking to sharpen your skills, this guide has you covered! Don't forget to like, subscribe, and hit the bell icon for more cybersecurity content.
Просмотров: 13
Видео
Web Security 101: Learn OWASP ZAP in Minutes!
Просмотров 4516 часов назад
What is OWASP? The Open Web Application Security Project (OWASP) is a nonprofit foundation focused on improving the security of software. It’s widely known in the cybersecurity community for creating resources, tools, and guidelines, including the OWASP Top Ten, a standard awareness document outlining the most critical web application security risks. What is OWASP ZAP? The OWASP Zed Attack Prox...
Macchanger Tutorial: Change Your MAC Address in Seconds!
Просмотров 190День назад
macchanger is a popular command-line tool in Linux for changing (spoofing) the MAC address of a network interface. It’s commonly used in ethical hacking and penetration testing to help testers and researchers simulate attacks, bypass filters, and anonymize their device on a network. Key Features of macchanger Randomize MAC Address: macchanger can generate a completely random MAC address, which ...
DHCP Starvation Attack: How Hackers Cripple Your Network (and How to Stop Them!)
Просмотров 55День назад
DHCP, or Dynamic Host Configuration Protocol, is like a phone operator for networks. When a device (like a computer, phone, or printer) connects to a network, it needs an IP address to communicate with other devices. Instead of someone manually assigning an IP address to each device, the DHCP server automatically does it for them. An attacker can make prevent new clients from accessing the netw...
What is a Web Application Firewall? Simple Guide + Using Wafw00f
Просмотров 4914 дней назад
A Web Application Firewall (WAF) is a security tool that sits between a website and the internet, acting like a filter for incoming web traffic. It monitors requests for signs of attacks, like SQL injection or cross-site scripting (XSS), and blocks any that seem suspicious. Essentially, it protects websites by catching malicious traffic before it can reach the web application, keeping data and ...
Passkeys vs Passwords: The Future of Safe, Easy Login.
Просмотров 16821 день назад
Passkeys is an improvement to password authentication where users can sign in to apps and websites with biometric. They are a digital credential tided to a user account and a website or application. Password authentication has been on an improving process, and to alleviate the burden on users developers created the option of storing passwords on the web browsers. Passkeys offer many benefits, i...
Unmasking ARP Poisoning: Understanding the Threat and Strengthening Your Defenses
Просмотров 2421 день назад
A man-in-the-middle (MITM) attack is a type of cyberattack where an attacker secretly relays and alters communications between two parties who believe they are directly communicating with each other. In essence, the attacker positions themselves between the two parties, intercepting and potentially modifying the data that passes between them. There are many types of MiM attacks, but they all op...
The Many Faces of Man in the Middle Attacks: A Detailed Exploration.
Просмотров 3228 дней назад
A Man-in-the-Middle (MITM) attack is a cybersecurity threat where an attacker secretly intercepts and potentially alters the communication between two parties who believe they are directly communicating with each other. The attacker places themselves between the two parties, allowing them to eavesdrop, steal sensitive data, or manipulate the messages being sent. Here's how it typically works: I...
Spot the Scams: Breaking Down a Fake SSA Email for Red Flags
Просмотров 74Месяц назад
In this video we'll go over red flags you can spot on a suspicious email, in this case we'll be analyzing the email social engineering techniques and then we'll any.run and virus total for technical analysis. Finally, once we verify the email does not contain malicious code we call the provided telephone number to see first hand how they continue to use social engineering techniques to steal in...
Stop Password Spray Attacks: Key Defense Tactics Explained
Просмотров 27Месяц назад
The basics of a password spraying attack involve a threat actor using a single common password against multiple accounts on the same application. This avoids the account lockouts that typically occur when an attacker uses a brute force attack on a single account by trying many passwords. Password spraying is particularly effective against businesses that participate in password sharing. Conside...
Customized Word Lists with CUPP: Enhance Your Password Testing Toolkit
Просмотров 25Месяц назад
Common User Passwords Profile (CUPP) allows you to Personalized Password Lists: CUPP generates password lists by gathering information such as a target's name, birthday, hobbies, family members, pets, and other personal details. Brute-Force Attacks: The tool creates lists of potential passwords for use in brute-force attacks based on personal information. Customization Options: CUPP allows user...
Enhance Your Security Toolkit: Crunch for Word List Generation
Просмотров 12Месяц назад
In this video we're going to go over cruch, a list generator tool that can be used for multiple testing, audit, and password ideas purposes. We'll be taking about the basic function of the tool and how It allows users to create custom wordlists by specifying parameters like character sets, minimum and maximum lengths, and specific patterns. Key features of Crunch include: Defining the character...
Kali Linux and Parrot Security Differences and Similarities, which is is right for the job.
Просмотров 118Месяц назад
In this video we'll talk about the differences and similarities between Kali Linux and Parrot Security, two of the most popular security distributions for pen tester and security professionals. We'll not go over the tools menu, but rather have a view of what they are what they do.
Tools to create User and Password and User lists to perform credential testing.
Просмотров 602 месяца назад
In this video we'll go over two tools and processes to create custom lists that can be used with other tools that rely on word list for for testing. The first tool is a cewl, a webpage crawler that extract words from pages and exports them to a text file. With cewl we can specify the word length to be extracted plus how deep we can the crawling to happen. This type of tools is perfect to create...
Basic Forensic Analysis with Autopsy - part 1
Просмотров 2482 месяца назад
In this video we'll go over the general settings of Autopsy and how to add a data source to the project to perform forensic investigation. This video series is not designed to teach you forensic investigation to be used in a court of law, but rather how to conduct investigation for internal purposes and to represent concise evidence of your findings.
Windows Vulnerability identification with Windows Exploit Suggester (WES -NG)
Просмотров 2042 месяца назад
Windows Vulnerability identification with Windows Exploit Suggester (WES -NG)
PrivescCheck - A simple to use tool to identify privilege escalation vulnerabilities on Windows.
Просмотров 1053 месяца назад
PrivescCheck - A simple to use tool to identify privilege escalation vulnerabilities on Windows.
Splunk Cloud UF Configuration - Enabling a Receiver for Splunk Cloud
Просмотров 3733 месяца назад
Splunk Cloud UF Configuration - Enabling a Receiver for Splunk Cloud
How to reset Splunk Enterprise Password on Linux installation
Просмотров 1013 месяца назад
How to reset Splunk Enterprise Password on Linux installation
Splunk Deployment Server Installation
Просмотров 1973 месяца назад
Splunk Deployment Server Installation
Understanding Network Ports: A Simple Guide for Beginners
Просмотров 533 месяца назад
Understanding Network Ports: A Simple Guide for Beginners
How to transfer files between Windows and Kali linux with impacket smbserver
Просмотров 4364 месяца назад
How to transfer files between Windows and Kali linux with impacket smbserver
WiFi Client Isolation - what is it and why would you want to implement it
Просмотров 5334 месяца назад
WiFi Client Isolation - what is it and why would you want to implement it
Hashcat 101 - simple password testing
Просмотров 1415 месяцев назад
Hashcat 101 - simple password testing
VMWare work around for Windows cannot find the Microsoft Software License Term error message
Просмотров 2655 месяцев назад
VMWare work around for Windows cannot find the Microsoft Software License Term error message
Configuring Meraki Splash Page with SMS Authentication
Просмотров 4615 месяцев назад
Configuring Meraki Splash Page with SMS Authentication
Splunk Cloud Foundation - 30 minute intro class into Splunk Cloud.
Просмотров 3166 месяцев назад
Splunk Cloud Foundation - 30 minute intro class into Splunk Cloud.
Thank you.This is what I was looking for.
Thanks for sharing the knowledge!
glad it was useful to you.
i can not login into openvas with admin username. the screen is "Login failed. Waiting for OMP service to become available."
Hi, did you try checking if the service is running? You can do by: systemctl status openvas-omp. If the service isn't running you can start it with: systemctl start openvas-omp
This is so good... i watched it to the end and learned alot.... thank you
Stop spamming. Let the FIDO scammers promote their own scam. Passkeys should NOT replace passwords, because logging in with a unique code for each account is infinitely more secure than using the same device unlock code for every account.
Wow! Layer 7 let's me block one application at a time with no allow rules! I'm impressed. It must take a lot of thought to be this useless.
So, question, what exactly do you need beside the UF server and a syslog-ng server for all of the clients?
Hello, watching. I'm not sure I understand the question, but let me elaborate just in case. To send logs from the client to the deployment server (if you choose to use it, deployment servers are optional) or directly to splunk cloud you need UF. You also need to deploy the cloud credentials and corresponding app for the client, then make the appropriate changes to the config file on the client. A syslog server is another piece of technology that you may or may no need, and if needed it requires a different type configuration and your splunk deployment will be a bit more complicated. My next splunk video will be demonstrating how integrate splunk cloud with deployment server and UF for Windows clients. Let me know if that answered your question.
Tnks...
Glad the video was useful.
super bro i get some information clearly after seeing your video
glad you found the video useful.
how to identify IP dan the VMware network should to NAT org bridge? because my VMware can't bridge, only NAT.
Hi Moch, can you please clarify what you mean by identify IP? Also, it'be better if you find a way to configure your vm in bridge mode, otherwise you may have issues with some packets or scans getting dropped depending on the configuration
You said nothing important about Process Explorer 🙄
thank you for the comment. I'll try to be more focus on a future video.
Great instructions and clarity 👍🏻
Glad it was helpful!
thanks
I'm glad the info was useful.
So you can have air marshal active in just certain Access points . Rather than in all of them , how do you that?
Yes, airmarshal is an access point setting. You can get to from the AP configuration page.
excellent appreciated
Glad you found it useful.
I went into an old hacker nostalgia memory lane tonight and I remember using l0pthcrack to crack old PWL files from Windows 98 I believe? The school network used Novell NetWare but there were PWL files stored in the Windows directory on almost every public machine - if not all of them. I don't exactly know how NetWare worked back then but I simply copied all the PWL files in the Windows directory and cracked them sort of instantly back home with this software in the late 90's. I got access to teachers accounts and I could read all the upcoming tests. I did not use this though because I'm the typical whitehat kind of guy and I failed mostly in all tests we had anyway. And oh, some guy messaged me one day over NetWare in school from admin, he used an exploit to gain admin access lol. NetWare was almost complete crap back then but those times were the good times to do some really cool hacking stuff.
Number of SSIDs is bit tricky, you can easily have 1 for corporate connection with 802.1x, another for Guest Wifi with Splashpage, another corporate that is hidden that does not support 802.1x and Guest Wifi with no spashpage.... Nice video, the GUI changed, however the information is still relevant. Meraki has added the Auto RF with Busy Hours for the Radio Settings which is a nice thing to use.
Thanks for the comment, certainly ssid management can be a juggling act.
@@itbestpractice2741@itbestpractice2741 I am prepping for the MR42/52 hardware refresh with newer models (36/44/54) and trying to tweak a few things before doing it. I will check out your other videos. I might get some inspiration to make a few Cisco FirePower or Fortigate videos for other tech fellows. So far, I have made only dog/puppy videos and some old CUCM/CUC/CER stuff (but a few years ago). Thanks again!
@@JayZx777 totally, you should post some tech videos. FP and fortigate are good technology topics. I'll look forward learning from them. I have a fortinet fw here and I'd like to learn more about other than the basic security controls.
Good work man! Very detail explaintion!😀
thanks, i'm glad you found it useful.
Hello, thank you for this video. Do you know if it's possible to combine MAC based and use a Network Policy with a group of real users allowed ?
Interesting, I never tried it, but it should work in theory. But what would be your goal, you certainly wouldn't like to over complicate your setup.
@@itbestpractice2741 Thank for your answer. Yes the goal is to use a Radius Server with the authentication for users (a group of user created in AD) and for a better security use the mac address of some computer allowed to connect to a specific Wi-Fi. How can I do that ? On the meraki Dashboard, Can I use the "Entreprise with My rRadius Server" Security or just the Mac-based access control will be good ? If I do a NPS on my radius server, do you think if I use 2 contraints (1 for the group user and 1 for the computer MAC allowed) won't cause any issues ?
bro why is this needed and what did you crcck over now and what device password did you find
Hi, you can use it for password audits, or password cracking for pen testing purposes. It was executed on a test environment, a ntlm hash was cracked.
any more how to tutorial Configuring Meraki Splash Page with Billing (paid access)?
Hi, not at this moment. I'll do another round of Meraki videos in the future though.
thanks sir you are the best teacher and and your teaching method is very easy .once again thanks
thank you for the kind word, I'm glad it was useful.
Please how do you start openvas after you reboot your system?
Hi, you can try openvas-start, then it can be accessed via url 127.0.0.1:9392
Great content, thanks for sharing!
thanks, I'm glad the info was useful.
Thank you very much for all, Quick question... At 3:31 in this video you mention another video about the NPS/RADIUS setup. Looking through your channel videos, I'm not sure I'm seeing the video you're referring to. Can you point me to that?
Hello, someone asked the same question before. I honestly though I had uploaded that video, but you're right, it doesn't show in any play list. I'll look for it, if I don't find it I'll create a new one as I need to setup a radius server for my lab.
@@itbestpractice2741 Ok thank you very much it would be very helpful
@@itbestpractice2741 Where you able to find it? I am stuck on my setup and would like to use your video for a guide.
Good tutorial... Simple and direct ! Thanks
Glad it helped. I also created a more detailed series on OpenVas administration in case you're interested in that too.
EvlWatcher Makes password cracker's life much harder. They would need a botnet to make any significant progress since by default it permanently bans IP after 5 * 3 = 15 tries. If they implement blacklist servers that would pretty much be impossible. That would make a botnet pretty much useless for RDP after attacking one target. DUO has an RDP MFA Solution - that makes password cracking alone ineffective. Sure, putting RDP behind a VPN is by far the most sensible option. If that's not practical limiting access from a single IP, ISP Ranges, or by country would limit RDP exposure. Changing the port just delays the discovery of RDP - can't be used as the only solution.
Very helpful. I wonder if there is a limit of how many users or device we can use the same credentials or if there is a way to limit 1 user to one specific device. Thank you.
I'm glad you found the information useful. At this moment you can't limit the number of concurrent connections. The only way I can think of limiting users to devices is requiring some type of ssl certificate on the devices. If i come. up with another idea I'll add it to the comment.
Amazin video, super useful. Thank you sir!
thanks, I also created a series on openvas administration. You may find it useful as well.
Thank, good info.
Can we use more than 2 ips in a notepad for this?
Yes, you can create a target list and use -M option to point to it.
This was great. Watched to the end. Security Analyst in training!!
Thank you for your comment. I'm glad you found the info useful. I'm creating a series on Splunk Cloud, that may be useful to you as well if you're new to it.
good info, thanks.
Glad it was helpful!
Great one mate.
Thank you, i'm glad the info was useful.
Thank You, Install went well. Want to know for what tasks we can use the Etherape otherthan network traffic monitoring ?
Hello, I'm glad the info was useful to you. The main tasks I've seen used - and use myself - are for network troubleshooting and analysis. It's very common to use along with other tools to verify findings.
Thank you for the video. Once it is finished, is the files stored somewhere? If I close it, I have to run it again to see its outputs?
Hello Ziren, I'm glad the info was useful. You can click on the Report tab on the bottom right of the window to export the results, the results are not downloadable files for the target website.
Thank you!@@itbestpractice2741
This is great. Very thorough on ow this process works, and if like me you dont use this feature on your LAN, then this is a PERFECT explanation. Thank you.
I'm glad the info was useful to you.
Nice Clear Explaination! Thanks a Mil!!
I'm glad the info was useful to you.
What's the export file for?
Also would you happen to know if there's anyway you can get back tracked or exploited at all using etherape? I'm just a little sketched out by the export file and can find very limited information about it.
Nice Explaination..
Thank you, I'm glad it was useful.
Will it scan whole desktop application. Example i have more binary files on my desktop. Will it scan binary files also?
تطبيق كالي لينكس لا يريد ان يشتغل عندي لماذا؟
good job man 👍
Thanks for the comment, I"m glad the info was useful to you.
How can we download the 7 day trial version of nessus and run the compliance Scan for DISA STIGs Google chrome? Can you guide me with that?
when i have 2 MX BOX with warm spare - routed, and terminated on the 1 single switch. then what would be the uplink configratuiion from switch towards meraki firewall.
It's the flipper of the pen-testing world.
very powerful tool indeed. Thanks for watching.
Thank you, this is one of the few videos that gave a good overview of etherape. Tnx
Glad you enjoyed it!
good easy to understand video. thank you❤❤
Glad it was helpful!
I highy suspect my neighbor hired an it guy to hack my wifi to enabe and disable my security cameras at whenever she pleases. I also have on a regular basis a device called Mysimolyink that on my network and that is the device that she uses for her security system. I do not have any devices or anythiing at all using MysimplyInk but if I block it using access control, my camera out back stops working I have tried changing the name of that device but it always gets changed back to my simlyiinik. Also, while running the Nma scan, I have multiple orts open such as 554 1025 etc and most of them say Microsoft msrpc but the first one 554 says rtsp ? is that anythig to worry about? Also I have 2 TPlink extenders for cameras too far away from router and I suspect maybe they are not secure also.
how do you combine the command for a port scan to include the scan for services on that port?
Hello dallaspilotcar, you specify the desired port by using -p and -sV for service version info. Depending on what you're doing, you can also use the -A for more comprehensive scan to include identify OS and service detection. I hope it helps.
I followed your RUclips since 6 months ago. I find Really your vedios are very good and informative sir.. Thank you🎉🎉🎉 Love from India
Thank so much, I hope future videos continue to be useful.