Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec

Поделиться
HTML-код
  • Опубликовано: 14 дек 2024

Комментарии • 39

  • @PurpleSec
    @PurpleSec  4 года назад +3

    Did we miss any steps in the firewall penetration testing process? Are there new tools or tactics you've had success with? Let us know!

    • @code123ns
      @code123ns 4 года назад

      No, but you are confused about firewall generations.

    • @PurpleSec
      @PurpleSec  4 года назад

      @@code123ns Well that's no good. Would you mind pointing out the area of confusion so we can take a look and get it updated?
      Thanks!
      - Jason

    • @code123ns
      @code123ns 4 года назад +2

      @@PurpleSec I would rather suggest you read Stallings. In the meantime: first gen filtered only by comparing L3 and L4 header with ACLs for each packet. Then statefull connection tracking was added. Then the ability to look at content above L4, scan for malware in payload, filter based on URL, scan encrypted traffic - this is what is mostly called next-gen. Add some AI, behavior analysis, attack profiles.. you've got IDS/IPS.

    • @PurpleSec
      @PurpleSec  4 года назад +1

      @@code123ns Appreciate the input! We'll take a look into this on our end and update accordingly. Thank you!

    • @jjjww975
      @jjjww975 3 года назад

      How about you actually show what's like to pen test a firewall externally and internally - use the tools in real time and view the results and then take the next steps until completion?

  • @TomassBross
    @TomassBross 4 года назад +7

    This is very informative and quality content. As a young aspiring cyber security specialist and ethical hacker, this was very useful to me. Thank you!

    • @PurpleSec
      @PurpleSec  4 года назад +1

      Happy to hear this was valuable for you, Tomass!
      - Jason

  • @tithiram
    @tithiram 2 года назад +2

    Very helpful, concise and precise. Thank you...!!! 🙏🙏🙏

    • @PurpleSec
      @PurpleSec  2 года назад

      Appreciate the kind words and feedback! Happy it was useful for you! Feel free to check out more -> purplesec.us/learn/
      - Jason

  • @manuneethis9076
    @manuneethis9076 3 года назад +2

    Thanks for your explanation on Firewall Pen Test. It’s really good to understand 👍

    • @PurpleSec
      @PurpleSec  3 года назад

      Happy to hear this helped!
      - Jason

  • @rickships1333
    @rickships1333 3 года назад +2

    Bro, you deserve more attention!! pls keep it up

    • @PurpleSec
      @PurpleSec  3 года назад +1

      Really appreciate the feedback! Seriously, this is what keeps us going. Let us know if you have any topics you'd like covered in the future!
      - Jason

  • @Thunder-dp7du
    @Thunder-dp7du 3 года назад +2

    First time to see content like this keep up bro

    • @PurpleSec
      @PurpleSec  3 года назад +1

      Appreciate the feedback! Thrilled to hear you enjoy the content. Let us know if there are any topics you'd like us to cover in the future.
      - Jason

    • @Thunder-dp7du
      @Thunder-dp7du 3 года назад +1

      @@PurpleSec I would be great if you could make something related cloud pentesting.

    • @PurpleSec
      @PurpleSec  3 года назад

      @@Thunder-dp7du excellent suggestion! We will add this to our queue.
      - Jason

  • @yousdouse6354
    @yousdouse6354 5 месяцев назад

    so how can we do firewall review and which standard we should follow while reviewing

  • @dominikavladimirovna1666
    @dominikavladimirovna1666 2 года назад +1

    Brilliant. Thank you so much

    • @PurpleSec
      @PurpleSec  2 года назад

      You’re very welcome. Glad this brought you value!
      - Jason

  • @vinodleo13
    @vinodleo13 2 месяца назад +1

    thank you very much

  • @borgeschannel
    @borgeschannel 2 года назад +2

    Quality content

  • @namdinh9517
    @namdinh9517 2 года назад

    from nmap manual, it seems nmap -sA results are filtered and unfiltered only, it never determines open or open|filtered.

  • @efiita7554
    @efiita7554 4 года назад +1

    great content..quite informative

    • @PurpleSec
      @PurpleSec  4 года назад

      Happy to hear this was of value!
      - Jason

  • @adarshbehera2413
    @adarshbehera2413 3 года назад +1

    Thanks for the knowledge. Can you let me know how to test a web application firewall?
    Thanks in advance

    • @PurpleSec
      @PurpleSec  3 года назад

      Glad this was helpful! My answer is… carefully.
      - Jason

  • @ngocthangphan8968
    @ngocthangphan8968 3 года назад

    What is ip and id in hping ?

  • @wolfiez2812
    @wolfiez2812 3 года назад +1

    very calitate but usefull when you whant to se kid istoric on ingognito big likee

  • @steiner254
    @steiner254 10 месяцев назад

    Awesome

    • @PurpleSec
      @PurpleSec  10 месяцев назад

      Glad you found value!
      - Jason

  • @cybersecurityshots7742
    @cybersecurityshots7742 3 года назад +1

    Bro voice is lil low!

    • @PurpleSec
      @PurpleSec  3 года назад

      You’re not the first to say this so I know it’s not a tech issue. Hopefully the content was at least good 🤣
      - Jason

  • @EldarGTR
    @EldarGTR 2 года назад

    Why you are deleting my comments? Do you think you are doing right? You have to accept All critics related to your video. It's 4 of 10.

    • @PurpleSec
      @PurpleSec  2 года назад +1

      Technically I don’t have to do anything. Also, I don’t delete comments unless it’s spam. So either you have the wrong PurpleSec or you spam 🤷‍♂️
      - Jason