Can Palo Alto Firewalls Really Prevent SQL Injection Attacks? | PART 9

Поделиться
HTML-код
  • Опубликовано: 31 дек 2024

Комментарии • 14

  • @kenmurphy4259
    @kenmurphy4259 Год назад

    Thanks Keith, great series on the palo

  • @ericktapia775
    @ericktapia775 Год назад

    Thanks, Keith!! following you a couple of months ago.

  • @lucasnyeinchan399
    @lucasnyeinchan399 Год назад

    well prepared video and thanks for sharing , i've been watching your pcnse video on cbt nuggets also

  • @issackali4501
    @issackali4501 Год назад +2

    Hello sir thanks for the lesson, it is really informative. I have a concern/question: where is that demo website hosted.?Is it on your LAN/Network or somewhere on the internet? if it is hosted somewhere on the internet, how will my firewall
    protect someone's website/application from SQL injection?
    if the website is hosted on your LAN/Network it's very impressive and makes a lot of sense to me. but from the video, it looks like the
    demo site is hosted somewhere else on the internet unless I did not get the point well.
    As for the case of WAF, we normally use it to protect the server hosting our application/sites which are in our LAN/DC.
    Kindly, enlighten me on this. Maybe my understanding is not ok.
    Thanks

    • @KeithBarker
      @KeithBarker  Год назад +1

      Thank you Issack Ali!
      If you want to prevent your internal users, from using a SQL injection attack against sites on the Internet, place the firewall between your users and the internet, and attach the vulnerability profile to the security policy rule that is allowing their initial flows of traffic, from their computers to the Internet.
      To prevent a SQL injection attack against server you are hosting, place the firewall between the Internet and your hosted server, and attach the vulnerability profile to the security policy rule that is allowing the initial flow of traffic from users on the Internet to your hosted server.
      The same logic would hold, if you have a server hosted in the cloud. Simply place the FW between it and the clients that access that server.
      Hope that helps, and thanks for the question.

    • @issackali4501
      @issackali4501 Год назад +1

      @@KeithBarker
      Thank you so much for the comprehensive reply and enlightenment. yeah really helped and
      well understood.🫡

  • @manindersinghnegi3989
    @manindersinghnegi3989 Год назад

    Thanks a lot for sharing such a Very informative Video, Could you please let me know SSL decryption is really necessary to configure before using vulnerability protection security profile.

  • @tomsheldon6398
    @tomsheldon6398 8 месяцев назад

    Are you Seth Meyers brother? Enjoying your videos. I just reset my PA440 and followed along with the instructions. Since I had unplugged all the cables during the reset, I forgot to reconnect the Management/console port to Interface 2. This caused all kinds of delays until I remembered. Maybe put that bit of info in your videos.

    • @KeithBarker
      @KeithBarker  8 месяцев назад

      Thank you @tomsheldon6398!

  • @ericaures4734
    @ericaures4734 Год назад

    How about Checkpoint / Juniper FWs?

    • @KeithBarker
      @KeithBarker  Год назад +1

      Thank you for the suggestion Eric Aures❗
      Its been a while since I worked on those, but next time I ramp up on those, especially the Checkpoint, I may make some RUclips videos as well.
      Thanks for the suggestion.