Build a Firewall that tells Hackers to Try Harder

Поделиться
HTML-код
  • Опубликовано: 28 янв 2025

Комментарии • 171

  • @GnarCoding
    @GnarCoding  Месяц назад +10

    Hello everyone! Due to popular demand, I have uploaded the code to Github which can be found in the video's description now.

  • @ChichaGad
    @ChichaGad Месяц назад +453

    In all of my backend servers, no matter what type of project, I implemented my rate limiter system in a way that it redirects any suspicious requests and/or brute force attacks to Never Gonna Give You Up music video on RUclips

    • @timothyt.82
      @timothyt.82 Месяц назад +21

      Absolute madlad. Respec.

    • @goobertnelius
      @goobertnelius Месяц назад +12

      Mine just puts them in yee old honey pot

    • @cheapdramas313
      @cheapdramas313 Месяц назад +1

      loool

    • @definitive_solutions
      @definitive_solutions Месяц назад

      ooooh I'm gonna do that with my APIs 404s lol. Right now I just tell them to GET OFF MY LAWN

    • @rvft
      @rvft Месяц назад +3

      Telegram's Deleted Account profile picture gives me enough info about what are you up to

  • @unknownboi9084
    @unknownboi9084 Месяц назад +106

    You are the type of teacher who is loved by everyone and everyone would never skip your classes.

    • @GnarCoding
      @GnarCoding  Месяц назад +5

      @unknownboi9084 thanks dude! I really appreciate that

    • @JavierHarford
      @JavierHarford Месяц назад +4

      Such a good video, a holistic overview plus diving into specific details is what's missing so much on RUclips now, this type of explanation shows you're a true Web native

    • @comosaycomosah
      @comosaycomosah Месяц назад +1

      @@GnarCoding it really is a great video and explanation well done m8

  • @thatoselepe388
    @thatoselepe388 Месяц назад +22

    I've been looking for this kind of RUclips channel for a while now. Glad I found and thank you for the lesson

  • @NurMarta-g4k
    @NurMarta-g4k 29 дней назад +2

    From here, i noticed how firewall working. Before it i just learning how to attack without knowing what happened backside of it. This so helpful for me. Nice job sir

  • @TotallyNotK0
    @TotallyNotK0 Месяц назад +10

    This was a pretty interesting video and I learnt some neat stuff from it. I'll definitely be experimenting with my own implementations of your script. Good work man

    • @GnarCoding
      @GnarCoding  Месяц назад

      Due to popular demand, I've uploaded the code to github which can now be found in the video description

    • @TotallyNotK0
      @TotallyNotK0 Месяц назад

      @GnarCoding awesome. Thank you!

  • @asassdsdd
    @asassdsdd Месяц назад +10

    You have a very good video format. Easy to understand.

  • @TakeMyStrongHand
    @TakeMyStrongHand Месяц назад +4

    Nice video! A clear voice and clear explanations! Love it. Keep them coming!

  • @CedroCron
    @CedroCron Месяц назад +47

    My father in-law had all sorts of issues with his VOIP having issues, I got rid of his off the shelf Netgear router and replaced it with a better Open Source firewall with more horsepower that can drop a lot of requests a lot faster than the slow junk sold on the shelf like his Netgear. Nothing but smooth VOIP calls now because the router isn't getting bogged down with so many scan packets it can't deal with.

    • @gamehacks5814
      @gamehacks5814 Месяц назад +29

      This is exactly how I list my skills on LinkedIn. You could have just said you bought a new router for your gramps 😭

    • @gavinex
      @gavinex Месяц назад

      @@gamehacks5814 damn

    • @CedroCron
      @CedroCron Месяц назад

      @@gamehacks5814 I didn't want to say what brand of firewall software I was using because it starts a flame war. So no it wasn't making it sound like I was overselling myself on a resume or linked-in.

    • @notaras1985
      @notaras1985 Месяц назад

      Which model

    • @washere3432
      @washere3432 Месяц назад

      @@gamehacks5814 😂😂😂

  • @kaiarachi
    @kaiarachi 27 дней назад

    Thanks for the video. you made the whole thing so easy to digest, even dissecting command flags. keep up the good work!

  • @Zydepoint
    @Zydepoint Месяц назад

    I rarely comment on youtube videos, but this video is done great! you have a nice tempo when you speak and you explained the concepts with ease. props!

  • @StudioVehga
    @StudioVehga Месяц назад +1

    I got affected by a stinky bad actor christmas eve and been picking up this a$$hole all week, now my uni PC is not in good shape. I may be down the shallow end with a lot of this stuff but at least i could follow it gave some direction where to go next to keep stacking up the knowledge. I like the fact that I actually heard the word defender, today think i needed to hear it. Great content, Thank you.

  • @shashi_gal
    @shashi_gal Месяц назад +2

    Amazing video. I learned a lot. Thank you so much and please keep the content coming.

  • @FRIDEI
    @FRIDEI Месяц назад +21

    Love this, just waste their time and make fun of them like always! 🤣

    • @rnts08
      @rnts08 Месяц назад +3

      One could just hold the connections, and reverse flood brute force attempts. Back when amplification attacks were more effective one could also use automated responses to rate limiting triggers. In theory.

  • @eg1525
    @eg1525 Месяц назад

    what a great video, this is exactly im studying about at the moment, and having it visualized like this is insane. Keep coding gnar, codin crazy

  • @lilacscepter223
    @lilacscepter223 Месяц назад +1

    not about being easily distracted, it's about feeling the child like excitement of cybersecurity to me. a lost art. liked and subscribed in hopes of learning a lot🙂i always wanted to have a "home-lab" ... but I don't even know what that means. I think what you did here might be part of what it means? let's build !!!

  • @eltyeb1
    @eltyeb1 26 дней назад

    I really like the way you explain

  • @Chillycloth
    @Chillycloth Месяц назад +2

    good work soldier. over and out 😤

  • @yassougamer3579
    @yassougamer3579 Месяц назад

    I loved the video ! It was very instructive. Give me idea to improve my personnal server security. Thanks bro !

  • @BillkMonny
    @BillkMonny Месяц назад

    Honestly i loved this video as ive been lookling forword to learning how to detect and block nmap scans, thx. :)

  • @comosaycomosah
    @comosaycomosah Месяц назад

    wish i coulda had vids like this about 4 5 years ago lol great job dude...this is hilarious but imo i wouldn't use on any server i had anything serious bc you know this just temps the hacker mindset like WHOA lol

  • @DatGuyWes
    @DatGuyWes Месяц назад

    New subscriber. You explain things very well!!!

  • @SarahBethea
    @SarahBethea Месяц назад

    Great, thorough explanation. I learned a lot, am super into this, and look forward to more videos like it!

  • @rafaelvigelandzoon5063
    @rafaelvigelandzoon5063 Месяц назад

    Thank you for your videos i hope you will make more. Your videos help me to better understand networking concepts.

  • @thegoodpowerdr
    @thegoodpowerdr Месяц назад +1

    Very good video bro, I learned a lot

  • @cbzp7
    @cbzp7 Месяц назад

    Thank you! This is gold.

  • @VypeReaper
    @VypeReaper Месяц назад +2

    This was very entertaining, interesting and informative. Do you have any low level tutorials on how to setup the basic firewall that comes in Windows 10/11 or a video with hints and tips on how to harden it? Thanks!

  • @Badeand
    @Badeand Месяц назад +5

    The IP that kept trying on port 25 is probably because DigitalOcean reuses previously used IP addresses. It might not be malicious. There might've been an email server on your IP address previously that they were using.

    • @GnarCoding
      @GnarCoding  Месяц назад +9

      @Badeand this is very possible! Great observation. I do think a packet every 2 seconds for 20 minutes straight is a bit excessive for me to believe that this the case though. However you may be right! False positives will always exist. I appreciate your insight! 🙏

  • @paulm5376
    @paulm5376 Месяц назад

    Amazing, very educational. I learned a lot

  • @SuperAnonlol
    @SuperAnonlol Месяц назад

    good job so far, keep it up and you'll be popular

  • @adissonbuchanan1731
    @adissonbuchanan1731 Месяц назад +1

    Wow your channel is quite impressive even content aside. Already almost 1000 subs including me and it’s only been a couple months. You explained very well and I’ll be implementing this very soon! Looking forward to more security tips

    • @GnarCoding
      @GnarCoding  Месяц назад

      @@adissonbuchanan1731 thank you!

  • @AnonymousIguana
    @AnonymousIguana Месяц назад

    Wow, subscribed right away! The way you describe things is very understable and i loved the high level overview of things at the start :)
    However, i have a question. How do all these other attackers know the IP address of your newly rented server? 🤔

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      thank you! there's a lot of bots out there constantly scanning

    • @AnonymousIguana
      @AnonymousIguana Месяц назад

      @@GnarCoding I see, they can just scan some IP ranges and for some cloud providers these are known publicly

  • @lStaline
    @lStaline Месяц назад +6

    lets say the attacker has a vm that allows modifying ip header he can just spoof the source ip what can we do against that?

    • @GnarCoding
      @GnarCoding  Месяц назад +9

      @lStaline If someone spoofs their IP address in the packet header, any response to that packet would be sent to the spoofed IP address, not the attacker’s actual IP address. This is because the spoofed IP is what the server believes is the source of the request.
      You can think of it like the mail system
      You can put whatever address you want in the From section, but the reciever will just respond to that From address

    • @cinderwolf32
      @cinderwolf32 Месяц назад

      ​@@GnarCoding yes, but will this fail to block it? If it fails because it tries to block the wrong address, couldn't your server even become a DoS amplifier for the real target if the attacker sends a ton of requests? You're blocking incoming but not outgoing and you send 2 packets for every one incoming, so I'd think so.

    • @GnarCoding
      @GnarCoding  Месяц назад +3

      @@cinderwolf32 Correct! This is why i show that even tho the firewall is in place, the initial packet with the syn flag still passes through the system (15:25). This is why you are not allowed to scan someone else's machine without their consent.

    • @cinderwolf32
      @cinderwolf32 Месяц назад

      Well, yes, but I'm happy to assume the attacker doesn't care and will leverage whatever I deploy anyway, if possible.

  • @dennistanui7085
    @dennistanui7085 Месяц назад +2

    Nice, please make a video about how you create the network maps

  • @corstian_
    @corstian_ Месяц назад

    Great video. Really well explained

  • @BkR090
    @BkR090 Месяц назад

    If you tell the hacker to "try harder", you can't sue them. Since you "asked" them do it.
    Same goes for welcoming messages.

  • @ellehooq
    @ellehooq Месяц назад

    Wow great content. I'm subscribing!

  • @Isnow1337
    @Isnow1337 Месяц назад +1

    Wouldn't that use a lot of resources, such as CPU and bandwidth? Most server hostings have limited bandwidth, and sending back a response each time might be both CPU and bandwidth intensive right? Great video though, it really explains alot of stuff to newbies

    • @GnarCoding
      @GnarCoding  Месяц назад +2

      Great point! Sending a response for every scan could use up some resources. For production systems, it’s definitely better to block directly without responding to conserve bandwidth and CPU. The 'try harder' message was more of a fun twist for the video. Glad you enjoyed the video!

  • @ansonshaji8576
    @ansonshaji8576 Месяц назад

    Wow that's a nice presentation i had in the end of 2024 ❤❤

  • @afonsocaboz5359
    @afonsocaboz5359 Месяц назад

    Loved the video, please DO continue! Im eager to learn more about cibersecurity!
    Couldn't you just use two docker containers in different IP's and networks to simulate this instead of paying for the servers?

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      thank you! you most def can do so as mentioned at 07:49. You can do everything from your own private network.

    • @afonsocaboz5359
      @afonsocaboz5359 Месяц назад

      @@GnarCoding True, I skiped the networks part(Nonetheless it is important for the video context) straight into the fun stuff 😆

  • @epicwolf3683
    @epicwolf3683 Месяц назад

    I found a youtube goldmine. This channel better blow up xD

  • @damianmuusers
    @damianmuusers Месяц назад +2

    Hi! I understand that your goal is to encourage learning through independent coding, but I’m still curious: do you happen to have your version of the script available as a reference? Everyone learns differently, after all. Thanks for sharing this video!

    • @GnarCoding
      @GnarCoding  Месяц назад +4

      thanks for your understanding - for real! here is a chatgpt prompt to get you started:
      "Hey chatgpt write a python script that will check packets for syn flags and then if the ip address exceeds 5, then add the ip to a block list using iptables. For added bonus, for the first five scans, push out a packet with a syn/ack flag and another packet containing a raw payload of "try harder". Be sure to unblock ips after 10 minutes and check to make sure you don't add the ip to the block list if it is already on the list"
      you got dis

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      due to popular demand, i have uploaded the code to github which can be found in the video's description now.

  • @marfcast101
    @marfcast101 Месяц назад

    Awesome stuff!

  • @Rjcastillo13
    @Rjcastillo13 Месяц назад

    Nice video, you got a new sub!

  • @danielfigueredo6761
    @danielfigueredo6761 Месяц назад +2

    Good tip but is better if you share the python script too.

    • @GnarCoding
      @GnarCoding  Месяц назад

      @@danielfigueredo6761 you can do it! I believe in you ❤️

    • @GnarCoding
      @GnarCoding  Месяц назад

      due to popular demand, i have uploaded the code to github which can be found in the video's description now.

  • @hydraim9833
    @hydraim9833 Месяц назад

    incredible video, thanks a lot.

  • @wrathofainz
    @wrathofainz Месяц назад +1

    Always send the homie a syn packet

    • @occultsupport
      @occultsupport Месяц назад +1

      only true homies send that ack back tho

  • @xnasunimc
    @xnasunimc Месяц назад +1

    should this be added to some kind of auto-run?

    • @saritarathod4623
      @saritarathod4623 Месяц назад

      Yes you could use a cron job to make this run on boot or like every 5 mins, you could also do the automation in .bashrc file or just create a daemon for this process but that's just overkill lol

  • @nathangetty4892
    @nathangetty4892 Месяц назад

    To be fair a TCP syn is not indicative of a scan, but the initialization of the TCP handshake.

    • @GnarCoding
      @GnarCoding  Месяц назад

      correct. (2:00 3:07 18:00)

  • @2008spoonman
    @2008spoonman Месяц назад +1

    Is using fail2ban not more secure against attacks?

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      @2008spoonman fail2ban works! Just used python here to show more in depth on packets and 3 way handshake

  • @omarsamy122
    @omarsamy122 Месяц назад +1

    This is incident response job or who do this in blue team ?

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      Blue team activity exists in a variety of fields. The great thing about cybersecurity is that it's necessary everywhere in tech. I'm not a career expert tho, so maybe ask chatgpt. Cheers!

  • @xnasunimc
    @xnasunimc Месяц назад +1

    does the -Pn option bypass this?
    just finished watching the video 😭😭🙏🙏

    • @GnarCoding
      @GnarCoding  Месяц назад

      thanks for watching! The -Pn option simply skips the first stage of checking if the machines online - so no, the scan still follows the same protocol. (15:04)

    • @xnasunimc
      @xnasunimc Месяц назад

      @@GnarCoding yes! I learnt that after finishing the video, thank you :3

  • @whatareyousaying339
    @whatareyousaying339 Месяц назад

    Maybe I’m off my rocker, but couldn’t an attacker use scans to overload a vulnerable router. In that it causes slowness for the user which prompts them to upgrade the router or increase speed plan. The attacker being an ISP?

    • @GnarCoding
      @GnarCoding  Месяц назад +2

      scans can def cause a DoS which is why you need permission before scanning anyone else's machine. the ISP stuff sounds pretty intense conspiracy like so i cant comment on that haha - but def not off your rocker in theory!

    • @whatareyousaying339
      @whatareyousaying339 Месяц назад

      @ Appreciate it man! Conspiracy sure but hey you never know today.

  • @Furry_Lord
    @Furry_Lord 28 дней назад

    Sensei😊

  • @exothekid
    @exothekid Месяц назад

    Does it helps when the attacker is using proxy? To avoid the Firewall i mean to avoid to trigger the firewall that he gets dropt?

    • @GnarCoding
      @GnarCoding  Месяц назад

      it doesnt necessarily help bc the proxy's ip will still get blocked. The attacker still needs to receive traffic from the proxy, which means their actions (even through a proxy_) are bound by the same principles of network communication.

  • @XMickleXx
    @XMickleXx Месяц назад

    u see the problem here ? people think they are "better" bc they try to mock evil actors but in reality, evil actors always winning and they never say a single word when they do

  • @Ibrahim-fs5dj
    @Ibrahim-fs5dj Месяц назад

    For the love of God post more cyber security type of videos

  • @snarfallymunchacen85
    @snarfallymunchacen85 Месяц назад +1

    The script you wrote, in github?

    • @GnarCoding
      @GnarCoding  Месяц назад

      I encourage you to write your own code

    • @GnarCoding
      @GnarCoding  Месяц назад

      due to popular demand, i have uploaded the code to github which can be found in the video's description now.

  • @UncleKennybobs
    @UncleKennybobs 22 дня назад

    * tcpdump can show ALL traffic, not just TCP or UDP

  • @kekitech
    @kekitech Месяц назад

    when using a popular cloud provider with one of their ip blocks, not all of those requests have to be malicious though. they could be, but they could also just be something looking for a machine that used to be there with the same IP you just got right?

    • @GnarCoding
      @GnarCoding  Месяц назад

      correct. False positives will always exist. you can also reference the ip on whatsmyipaddress website to see if it has been blacklisted

  • @brentsaner
    @brentsaner Месяц назад +1

    Writing a firewall hook in python is... certainly a decision.

  • @tyulik
    @tyulik Месяц назад

    Wait why was he being scanned one minute into the video?

    • @GnarCoding
      @GnarCoding  Месяц назад

      @tyulik bc they're zombies bro.

    • @tyulik
      @tyulik Месяц назад

      @@GnarCoding like a botnet?

  • @GdncHfjbdkf
    @GdncHfjbdkf Месяц назад

    What about after recon has been established, bad actor has your commonly used dns request via dbs spoofing and also ca certification to mitigate tls encryption on browser well what then?

    • @GnarCoding
      @GnarCoding  Месяц назад

      A rogue CA cert installed on the machine would mean the machine was already compromised and likely already under C2 (command and control). There are layers of defense that are needed to avoid the attacker getting to this stage. Recon is stage 1 - so this scenario you describe assumes all other stages were completed.

  • @daem0n1ze
    @daem0n1ze Месяц назад

    nice imma try that

  • @alanwparkerap
    @alanwparkerap Месяц назад

    Where can we find the python script? You should make a github and drop the stuff from videos in it.

    • @GnarCoding
      @GnarCoding  Месяц назад

      @@alanwparkerap I highly encourage you to write your own scripts. AI makes it easier than ever. It'll never work the first try, but that's the point. Cheers! Thanks for watching!

    • @GnarCoding
      @GnarCoding  Месяц назад

      due to popular demand, i have uploaded the code to github which can be found in the video's description now.

  • @phoneywheeze
    @phoneywheeze 29 дней назад

    wouldn't the try harder response go back to someone legit who's trying to connect as well?

    • @GnarCoding
      @GnarCoding  28 дней назад

      This is a good point! You could modify the python script to only send it before the block.

  • @Dailymemespoidy
    @Dailymemespoidy Месяц назад +2

    Can you make a video about how to evade these firewals and how to conduct a stealth penetration test with advance enumuration.
    really like this video and very easy to understand Im grateful good luck🔥

  • @AndreeaCe
    @AndreeaCe Месяц назад

    If these walls could talk...
    Ohh
    Wait...
    Some do

  • @4evrOk4U
    @4evrOk4U Месяц назад +1

    code

    • @GnarCoding
      @GnarCoding  Месяц назад

      I highly encourage you to write your own scripts. AI makes it easier than ever. Here is a prompt to help get you started:
      "Hey chatgpt write a python script that will check packets for syn flags and then if the ip address exceeds 5, then add the ip to a block list using iptables. For added bonus, for the first five scans, push out a packet with a syn/ack flag and another packet containing a raw payload of "try harder". Be sure to unblock ips after 10 minutes and check to make sure you don't add the ip to the block list if it is already on the list"
      you got dis

    • @GnarCoding
      @GnarCoding  Месяц назад

      due to popular demand, i have uploaded the code to github which can be found in the video's description now.

  • @74_Green
    @74_Green Месяц назад

    Funny that 117 is flagged on VirusTotal url scan xD

  • @CreativeWerxGFX
    @CreativeWerxGFX Месяц назад

    I'm 9 minutes in... What about udp protocol?

    • @GnarCoding
      @GnarCoding  Месяц назад

      tcpdump tool can also show udp traffic which is another popular protocol typically used in streaming services.

    • @CreativeWerxGFX
      @CreativeWerxGFX Месяц назад

      @@GnarCoding Alright, that's not what i'm getting at however. There is no handshake in udp. That means no syn. No syn=no sus traffic. How do you block those udp attacks without knowing which ip to block?

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      @CreativeWerxGFX ah I see. Suspicious activity can be defined a variety of ways (06:20). You would simply add some logic to look out for a multitude of udp packets going to a variety of ports. Those packets still pass through the NIC to be processed. Good question!

    • @CreativeWerxGFX
      @CreativeWerxGFX Месяц назад

      @@GnarCoding I see. That's slightly discouraging. quic protocol has not replaced tcp entirely just yet, I'm afraid if it becomes the standard, using firewall script to block traffic may cause too many false positives to make its primary daily use any worth while.

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      @CreativeWerxGFX generally IDS is preferred over IPS due to this concern

  • @thumbnailqualityassurance7853
    @thumbnailqualityassurance7853 Месяц назад

    getting scanned by shodan has nothing to do with getting "hacked"

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      Wrong. Recon is first stage of attack lifecycle. Also shodan wouldn't be trying to connect to the smtp port for 20 minutes straight.

  • @Astroisback01
    @Astroisback01 Месяц назад

    Hey Can you please
    send me these codes? I wish to create a project using your code for my collge project.Thank you

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      @Astroisback01 this should give you a good start:
      "Hey chatgpt write a python script that will check packets for syn flags and then if the ip address exceeds 5, then add the ip to a block list using iptables. For added bonus, for the first five scans, push out a packet with a syn/ack flag and another packet containing a raw payload of "try harder". Be sure to unblock ips after 10 minutes and check to make sure you don't add the ip to the block list if it is already on the list"

    • @GnarCoding
      @GnarCoding  Месяц назад

      due to popular demand, i have uploaded the code to github which can be found in the video's description now.

    • @Astroisback01
      @Astroisback01 Месяц назад

      @@GnarCoding Thank you so much for keeping my comment in mind and notifying me bud much appreciated

  • @bartgan11
    @bartgan11 Месяц назад

    how about fail2ban?

    • @GnarCoding
      @GnarCoding  Месяц назад

      that works too! wouldn't have been as fun a video tho. thanks for watching!

  • @fairnut6418
    @fairnut6418 Месяц назад

    tells the Bots to Try Harder*

  • @marcusaurelius3487
    @marcusaurelius3487 Месяц назад

    why not just use ufw firewall, takes less time and commands easier to navigate with and remember

    • @GnarCoding
      @GnarCoding  Месяц назад

      this works too! thanks to the subprocess in python - you can replace the command with whatever you prefer - the process stays the same. thanks for watching!

  • @treyyounglover
    @treyyounglover Месяц назад

    thanks the hacker deleted all my files and locked me out

    • @GnarCoding
      @GnarCoding  Месяц назад

      Hey mate hope you're joking. Otherwise please take note of first 5 seconds of video that says to use a test server

  • @laszlob3683
    @laszlob3683 Месяц назад

    so its not free

    • @GnarCoding
      @GnarCoding  Месяц назад

      you can simulate whole process on vm's in a private network for free.

  • @gabrielspeed5464
    @gabrielspeed5464 Месяц назад

    sounds like I'm OK since I use pubkey auth + pwd + CIDR range restriction via ipset/iptables on my commercial boxes. Also fail2ban :D. I just assume my VPS and DNS providers will handle/absorb DDoSing I guess. this is going on Watch Later :)

  • @matterhadness
    @matterhadness Месяц назад +1

    hilarious

  • @EchoesofEgypt
    @EchoesofEgypt Месяц назад +1

    Im new to Computer Communications and i have no clue what i just watched 😂😂😂

    • @GnarCoding
      @GnarCoding  Месяц назад

      @@EchoesofEgypt haa! It is fine line from boring to chaos. Thanks for watching

  • @1337haxxor
    @1337haxxor Месяц назад +1

    😂😂😂😂

  • @n.park1
    @n.park1 Месяц назад

    Oh dear, ai thumbnails are already plaguing RUclips... 😔

    • @GnarCoding
      @GnarCoding  Месяц назад +1

      that's photoshop my dude, thank you though!

  • @AllesanddroLP
    @AllesanddroLP 27 дней назад

    F2B

  • @cw8jwh
    @cw8jwh Месяц назад

    "Build a Firewall that tells Hackers to Try Harder" ?!
    Uh, that's fornicatingly unintelligent.
    Build a Firewall that tells Hackers You're a boring POS with nothing of interest.
    Duh.

  • @vedantkanoujia
    @vedantkanoujia Месяц назад +1

    hmm let me try with my proxychains btw with --mtu 8

  • @mixrutka312
    @mixrutka312 Месяц назад

    Use fail2ban

  • @__pain__05
    @__pain__05 Месяц назад

    nmap -Pn $ip