Technical Security
Technical Security
  • 249
  • 272 199
15 Device Groups, Templates, and Security Zones
#firewall #paloalto #paloaltofirewall #paloaltonetworks
Переглядів: 38

Відео

12 Push Template Stacks to Devices
Переглядів 15Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
13 Overriding Template Settings on Firewalls
Переглядів 19Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
14 Adding Device Groups
Переглядів 18Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
17 Creating an Object
Переглядів 8Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
18 Shared Group
Переглядів 5Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
19 Changing Inherited Object Values
Переглядів 11Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
20 Managing Device Groups
Переглядів 4Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
21 Moving an Object to Another Device Group
Переглядів 3Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
22 Viewing Inherited Rules
Переглядів 5Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
23 Creating a Policy Rule
Переглядів 2Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
24 Verify Rulebase on Firewalls with Preview Rules
Переглядів 5Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
27 Log Forwarding Profile Panorama Only Example
Переглядів 8Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
28 Log Forwarding Profile Syslog and SNMP Example
Переглядів 10Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
29 Log Forwarding Profile Traffic Log Example
Переглядів 13Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
30 Defining Panorama Server Profiles
Переглядів 5Місяць тому
30 Defining Panorama Server Profiles
31 Defining Log Forwarding Profiles for Panorama
Переглядів 33Місяць тому
31 Defining Log Forwarding Profiles for Panorama
32 Creating an External Server Profile
Переглядів 5Місяць тому
32 Creating an External Server Profile
33 Creating an Authentication Profile for LDAP
Переглядів 8Місяць тому
33 Creating an Authentication Profile for LDAP
34 Creating an External Server Profile RADIUS
Переглядів 10Місяць тому
34 Creating an External Server Profile RADIUS
35 Creating an Authentication Profile for RADIUS
Переглядів 7Місяць тому
35 Creating an Authentication Profile for RADIUS
36 Admin Roles in Panorama
Переглядів 12Місяць тому
36 Admin Roles in Panorama
25 Policy Rule Usage Counters
Переглядів 6Місяць тому
25 Policy Rule Usage Counters
26 Tag Based Rule Groups
Переглядів 19Місяць тому
26 Tag Based Rule Groups
37 Admin Roles Device Group and Template
Переглядів 6Місяць тому
37 Admin Roles Device Group and Template
38 Creating an Access Domain
Переглядів 27Місяць тому
38 Creating an Access Domain
39 Config Locks and Multiple Administrators
Переглядів 27Місяць тому
39 Config Locks and Multiple Administrators
40 Customize Log File Views in Panorama
Переглядів 15Місяць тому
40 Customize Log File Views in Panorama
41 Creating Search Filters
Переглядів 3Місяць тому
41 Creating Search Filters
42 Using the Filter Builder
Переглядів 13Місяць тому
42 Using the Filter Builder

КОМЕНТАРІ

  • @RickHardBR
    @RickHardBR Місяць тому

    Thanks man, it helped a lot. I liked it and subscribed

  • @FrancoJavier-jg6so
    @FrancoJavier-jg6so 2 місяці тому

    File "/home/kali/Downloads/keepnote-0.7.8/bin/keepnote", line 380 print "available commands:" ^^^^^^^^^^^^^^^^^^^^^^^^^^^ SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)? I have this issue in the last prompt

  • @guilhermeleme9012
    @guilhermeleme9012 3 місяці тому

    obrigado, ajudou

  • @ArthursHD
    @ArthursHD 4 місяці тому

    Now Hasmob has newer password lists :) 1. Put it behind an Overlay VPN like Netbird (Better use it with MFA) 2. Or at least a traditional VPN (Better use it with MFA) 3. Change the port (this only delays the attacker) 4. Limit source IP to a single IP, range, ISP, or geo-block 5. Use fail2ban to block bad IPs 6. Use strong passwords and unique usernames or disable password authentication 7. Disable root login from SSH 8. Actively monitor the network for suspicious activity. Any other solution to secure SSH? It's best to do - Zero Trust Network Access and Principle of Least Privilege

  • @AndriiA-z1l
    @AndriiA-z1l 4 місяці тому

    useless

  • @edvandromauricio7353
    @edvandromauricio7353 5 місяців тому

    how can i contact with u bro , i wanna make some network with u .

  • @lore2005
    @lore2005 5 місяців тому

    thank you

  • @bjornm.2183
    @bjornm.2183 6 місяців тому

    Imagine the case, production links are going down but lab is still up. It won't failover but for productive reasons it should, right? So better delete the Link Group Lab and all should be fine.

  • @HP12c
    @HP12c 6 місяців тому

    melhor video aula vls

  • @Hackerone1444
    @Hackerone1444 6 місяців тому

    Is this algorithm confusion attack ??

  • @Robert_883
    @Robert_883 7 місяців тому

    Can't see CIDR block format, why need to hide, just use fake.

  • @ShivamRaj-hj9ls
    @ShivamRaj-hj9ls 7 місяців тому

    Not working bhai

  • @Samyar_Sadeghi
    @Samyar_Sadeghi 8 місяців тому

    Policy Types (F5 BIG-IP ASM/AWAF): - Automatically (Fundamental, Enhanced, Comprehensive) - Manually (Rapid Deployment) - API Security (XML,JSON,...) - Default Templates - Vulnerability Assessment Tools (3rd Party Company) - Passive (Traffic Mirroring)

  • @abdul-azeez-v
    @abdul-azeez-v 9 місяців тому

    What does this show ? Is that token comming from redacted website ? Or reading from client web browser ? I can't understand

  • @yethrodebemorir
    @yethrodebemorir 9 місяців тому

    For those asking about cabling, there are some considerations First, there are some firewalls with dedicated HA1 and HA2 ports and they are labeled. Those have no further mistery, you just connect HA1 of FW1 to HA1 of FW2 and HA2 of FW1 to HA2 of FW2. For firewalls that have no dedicated HA ports, the best practice is to use the Management ports as HA1 (control) link. - The two main ways of doing this are 1. Directly connecting the Management interfaces of both NGFWs. Connecting MGMT of FW1 to MGMT of FW2 and set them both as HA1. 2. Connecting both Magament interfaces to a switch and still set them both as HA1. - Way 1. is simpler and may be better for smaller networks. Its greatest disadvantage is that you can no longer access the out of band Management port, you'd have to assign an in-band data interface as a Management one (ideally putting it in your separate administration network with its dedicated VLAN, etc...) Way 2. is the best for bigger, more complex networks. The only disadvantage it has is that the switch working as an intermediary for both Management/HA1 ports is a new point of failure. Ergo, if the switch fails, the HA fails. But this method allows you to still access the Management interfaces for management purposes as they keep the HA1 communication at the same time as you access them, they even use separate IPs for each task, its pretty much as if you had created a management subinterface for HA1. If concerned about traffic spoofing, you can enable encryption for the HA1 (control link) connection. - For HA2, in any of those 2 cases you just assign an in-band data port as HA type and set it up as HA2 in Device --> HA --> HA communications - Still, in my experience, the best thing to do is to just set up 2 data ports as HA type and use one for HA1 and the other for HA2, but I am not a Best Practice Expert, just a silly little dude.

  • @NamLe-fl4sz
    @NamLe-fl4sz 9 місяців тому

    From VietNam. Thankss

  • @omidalmasieh7262
    @omidalmasieh7262 10 місяців тому

    When in HA mode, your eth 1/1 or eth 1/2 will have same IP on both firewalls!

  • @colbyc3129
    @colbyc3129 11 місяців тому

    Does the IPs listed in Peer HA1 matter if they are publicly routable If the pair are directly connected?

  • @GreenPasturesFinancl
    @GreenPasturesFinancl 11 місяців тому

    Audio No..

  • @kingofspade9182
    @kingofspade9182 11 місяців тому

    What next?

  • @animal9470
    @animal9470 Рік тому

    What about cabling...

    • @yethrodebemorir
      @yethrodebemorir 9 місяців тому

      @animal9470 There are some considerations. First, there are some Palo Alto NGFWs with dedicated HA1 and HA2 ports and they are labeled. Those have no further mistery, you just connect HA1 of FW1 to HA1 of FW2 and HA2 of FW1 to HA2 of FW2. For firewalls that have no dedicated HA ports, the best practice is to use the Management ports as HA1 (control) link. - The two main ways of doing this are 1. Directly connecting the Management interfaces of both NGFWs. Connecting MGMT of FW1 to MGMT of FW2 and set them both as HA1. 2. Connecting both Magament interfaces to a switch and still set them both as HA1. - Way 1. is simpler and may be better for smaller networks. Its greatest disadvantage is that you can no longer access the out of band Management port, you'd have to assign an in-band data interface as a Management one (ideally putting it in your separate administration network with its dedicated VLAN, etc...) Way 2. is the best for bigger, more complex networks. The only disadvantage it has is that the switch working as an intermediary for both Management/HA1 ports is a new point of failure. Ergo, if the switch fails, the HA fails. But this method allows you to still access the Management interfaces for management purposes as they keep the HA1 communication at the same time as you access them, they even use separate IPs for each task, its pretty much as if you had created a management subinterface for HA1. If concerned about traffic spoofing, you can enable encryption for the HA1 (control link) connection. - For HA2, in any of those 2 cases you just assign an in-band data port as HA type and set it up as HA2 in Device --> HA --> HA communications

  • @AhmedRaza-kp8io
    @AhmedRaza-kp8io Рік тому

    not working

  • @itsm3dud39
    @itsm3dud39 Рік тому

    when clicking it wont download the certificate. why??

  • @Aazib_x25
    @Aazib_x25 Рік тому

    command not found gtk-recordmydesktop

    • @maheshwaranup5695
      @maheshwaranup5695 Рік тому

      did u do the first command? sudo apt-get install gtk-recordmydesktop actually its not working for me did u skip this step? or i am theonly one facing the issue 👀

    • @Aazib_x25
      @Aazib_x25 Рік тому

      @@maheshwaranup5695 not working directly its has to update resporitories after it done now i have to know configuration not working this command

    • @hamamunashe
      @hamamunashe 4 місяці тому

      sudo apt install recordmydesktop This will do

    • @Aazib_x25
      @Aazib_x25 4 місяці тому

      @@hamamunashe still not workin'😔

    • @godjhaka
      @godjhaka 3 місяці тому

      @@Aazib_x25 PICNIC: problem in chair, not in computer

  • @JR-nq7it
    @JR-nq7it Рік тому

    Some audio and better resolution would be great.

  • @InzamamShahid-q4b
    @InzamamShahid-q4b Рік тому

    How should the interfaces be cabled up? Should they connect to each other directly or via switches?

    • @robinjohn2587
      @robinjohn2587 Рік тому

      Can be connected directly between the two firewalls

    • @malcolmlobo5291
      @malcolmlobo5291 10 місяців тому

      Yes they can be connected directly to each other

  • @ajibolayusuf2057
    @ajibolayusuf2057 Рік тому

    Wow! Your explanation is so clean and understandable! Thank you!

  • @RishiRap
    @RishiRap Рік тому

    Awesome video with all relevant details!

  • @solarfr0st
    @solarfr0st Рік тому

    the most stupid application ever doesn't even work

  • @wysadque
    @wysadque Рік тому

    how this attack could be used/escalated? is this considered self-xss?

  • @expertforexandbinary676
    @expertforexandbinary676 Рік тому

    Hello. Sir can this tools solve hash seed? To find hash coefficient?

  • @tahersadeghi6773
    @tahersadeghi6773 Рік тому

    Great and clear description. I hope you produce more tutorial videos. Thank you.

  • @GHOSTWRIDAHxCOEV1D
    @GHOSTWRIDAHxCOEV1D Рік тому

    nice audio....

  • @AE-nt3jj
    @AE-nt3jj Рік тому

    🤣

  • @henryt7312
    @henryt7312 Рік тому

    After a little digging into the source code of sqlmap on github, i found that there is a "bias" towards the input file being a raw dump of a http request intercepted by burpsuite or webscarab. Any other file (manually copy-pasted for instance from a web browser's http traffic as seen in the debug console) is somehow not ok.

  • @eleazarhernandez4343
    @eleazarhernandez4343 Рік тому

    kali㉿kali)-[~/Downloads] └─$ keepnote-0.7.8/bin/keepnote File "/home/kali/Downloads/keepnote-0.7.8/bin/keepnote", line 380 print "available commands:" ^^^^^^^^^^^^^^^^^^^^^^^^^^^ SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)?

  • @amirasgari95
    @amirasgari95 Рік тому

    what is -y

    • @frankyfriday
      @frankyfriday Рік тому

      Its just the Yes command for installing software.

  • @waqarirshad1931
    @waqarirshad1931 Рік тому

    Do you provide training and assistance

  • @crypto7665
    @crypto7665 2 роки тому

    Next video please 🙏

  • @nerdgirlwhat
    @nerdgirlwhat 2 роки тому

    There's no audio.

  • @StevePringle
    @StevePringle 2 роки тому

    We picked the same background music "Late Night Drive" for our videos. 😂

  • @siddiquigulamgaus8252
    @siddiquigulamgaus8252 2 роки тому

    It helps a Lot ❤️

  • @RO-BO
    @RO-BO 2 роки тому

    Absolutely life saver. thanks

  • @Free.Education786
    @Free.Education786 2 роки тому

    Please make beginner to advance level practical live website hacking, live website bug hunting, live website penetration testing, live website exploitation content video series... 🙏 😊 💯✌❤💚💙💜😍😘🤝

  • @old2235
    @old2235 2 роки тому

    Except you got a signature from somewhere I didn't know about if not it's not possible. But thank you for showing it

  • @abbasleaders5214
    @abbasleaders5214 2 роки тому

    Hi guys the command sudo apt install libjenkins-htmlunit-core-js-java doesn't work anymore!! any suggestions?

  • @ManjuM-br2lx
    @ManjuM-br2lx 2 роки тому

    the video image is too poor, you need to fix it more

  • @rafy-ivanmorales3077
    @rafy-ivanmorales3077 2 роки тому

    I'm a new student trying to learn, so I can become a programmer with python and I have a project on how to make a port scan. So far I already make a port scan with Python3, and it scans fine, give a date and everything working good so far. I see on your video tutorial, it is very good. I would like to ask for your advice if you can and guide me on how I will add this 3 in a Python script, I have: I only have problems with this 2 3. If the Ports is open, it should create a file and add an entry for port number 4. In case of any exception for instance “host is not available”, “host name could not be resolved” or due to any other error, you need to write that exception into the same file. Thank you and Merry Christmas.

  • @rishikreddy4526
    @rishikreddy4526 3 роки тому

    ok

  • @raunvk
    @raunvk 3 роки тому

    absolutely clueless.....do you even know what you're doing. came here for help ended up being more messed up -_-