- 40
- 82 855
Tom BH
Приєднався 10 бер 2019
AlienVault OSSIM - Installation
In this video we will install AlienVault OSSIM Server!
Help support the channel with a like, comment & subscribe!
Links:
cybersecurity.att.com/products/ossim
Disclaimer and Warning:
The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity.
Viewers are advised to comply with all applicable laws and regulations in their jurisdiction.
By watching this video, viewers agree to take full responsibility for any actions they may take as a result of the information presented.
Viewers are encouraged to conduct their own research and seek professional advice where appropriate as needs may vary based on individual circumstances.
I offer no warranty or guarantee of any kind regarding the accuracy, completeness, or reliability of the information presented in this video.
I do not accept any responsibility or liability for any direct or indirect loss or damage or consequences (whether in tort, contract or otherwise) which may be suffered or occasioned by any person howsoever arising due to any inaccuracy, omission, misrepresentation, or error in respect of any information and content provided by this video including any third-party websites or vendors or tools mentioned.
This video is not affiliated with, endorsed by, or sponsored by my current, past, or future employers or businesses nor does it reflect the views or opinions of any organization with which I may be associated.
Help support the channel with a like, comment & subscribe!
Links:
cybersecurity.att.com/products/ossim
Disclaimer and Warning:
The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity.
Viewers are advised to comply with all applicable laws and regulations in their jurisdiction.
By watching this video, viewers agree to take full responsibility for any actions they may take as a result of the information presented.
Viewers are encouraged to conduct their own research and seek professional advice where appropriate as needs may vary based on individual circumstances.
I offer no warranty or guarantee of any kind regarding the accuracy, completeness, or reliability of the information presented in this video.
I do not accept any responsibility or liability for any direct or indirect loss or damage or consequences (whether in tort, contract or otherwise) which may be suffered or occasioned by any person howsoever arising due to any inaccuracy, omission, misrepresentation, or error in respect of any information and content provided by this video including any third-party websites or vendors or tools mentioned.
This video is not affiliated with, endorsed by, or sponsored by my current, past, or future employers or businesses nor does it reflect the views or opinions of any organization with which I may be associated.
Переглядів: 76
Відео
AlienVault OSSIM - Overview
Переглядів 5721 день тому
In this video we will take an overview of AlientVault OSSIM! Help support the channel with a like, comment & subscribe! Links: cybersecurity.att.com/products/ossim Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulat...
Tails and TOR
Переглядів 453Місяць тому
In this video we will learn how TOR works and take a look at the Tails OS! Help support the channel with a like, comment & subscribe! Links: Tails - tails.net TOR - www.torproject.org TOR nodes - www.dan.me.uk/tornodes Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are...
Sandbox Evasion - Stage 2
Переглядів 1164 місяці тому
In this video we will see sandbox evasion (Sandboxie) Help support the channel with a like, comment & subscribe! Links: sandboxie-plus.com Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdictio...
Sandbox Evasion
Переглядів 1494 місяці тому
In this video we are going to talk about how hackers bypass sandboxes! Help support the channel with a like, comment & subscribe! Links: github.com/a0rtega/pafish Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulati...
WSC Takeover with No Defender
Переглядів 1335 місяців тому
In this video we will demonstrate WSC takeover! Help support the channel with a like, comment & subscribe! Links: github.com/es3n1n/no-defender Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisd...
OpenEDR - Agent Deployment
Переглядів 1815 місяців тому
In this video we will deploy the first OpenEDR agent. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction....
OpenEDR - Registration
Переглядів 295 місяців тому
In this video we will register a new account with OpenEDR. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdic...
OpenEDR - Overview
Переглядів 2215 місяців тому
In this video we will take an overview of OpenEDR. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction. By...
Proxmox Mail Gateway - Updates
Переглядів 7155 місяців тому
In this video we will configure Proxmox Mail Gateway (PMG) updates and upgrades. Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdicti...
Proxmox Mail Gateway - Initial Setup
Переглядів 2,5 тис.6 місяців тому
In this video we will perform the initial Proxmox Mail Gateway (PMG) setup. Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction. B...
Proxmox Mail Gateway - Installation
Переглядів 1,1 тис.6 місяців тому
Proxmox Mail Gateway - Installation
AntiVirus Basics - Signatures Based Detection
Переглядів 1,9 тис.2 роки тому
AntiVirus Basics - Signatures Based Detection
UAC Bypass - Explanation and demonstration
Переглядів 7 тис.2 роки тому
UAC Bypass - Explanation and demonstration
❤❤i
Cathrine Manor
Kemmer Trace
Fadel Mountains
Towne Row
Davonte Stravenue
Nice Video, Clear and Informative. I do have i question, how does the server send back the information if it doesnt know how sent it?
Thanks. Server will send the traffic back using the same circuit: server to C, C to B, B to A and A to the user. As far as the web server is concerned the traffic came from the exit node (C) and that is where the response will be sent to. C knows it needs to send traffic to B and so on...
I can't run Start-Process
Gislason Courts
Kyleigh Views
Johns Valley
West Lodge
Krystel Mission
Powlowski Expressway
19102 Kovacek Motorway
"pretty high priviliges" with most features disabled. good vid tho!
Hi The fact that they are disabled doesn't mean they are not available to the user. And thank you!
The integrity level is high, that's what matters. He can get a SYSTEM level shell and do whatever he wants on the system. He can also enable any of the privileges that are disabled.
Kemmer Lake
Kamryn Ports
Jarrett Dam
Shawna Forge
Luettgen Mount
Roel Tunnel
McLaughlin Skyway
Deborah Neck
Very well explained
"Transmission Control Protocol, together with Internet Protocol, forms the basis of the TCP/IP 4-layer model. These layers are conceptual frameworks that define how data should be transmitted over a network to ensure stable connections. Each layer in the model serves a different purpose. For instance, the **Network Access Layer** (the first layer) involves the physical aspects of network connections, such as the hardware responsible for data transmission. Please note, I am still under training, and the information in this comment may require further refinement or additional details."
awesome can you do some on wazuh? Its a great way to secure your network with industry standards and its FREE, or any alternative you like?
awesome playlist of videos, if you can do some on proxmox VE passing P4 PGU to containers not using the VGPU and the nvidia drivers as some have has success doing it but its not documented. I am having an issue at the moment that my VM's have started to run slow for some reason, I am using R730 SAS SSD (enterprise 1.8Gb) in HBA mode with ZFS so should be fine, I am getting another just for the Proxmox OS next month.. Doing a fresh install of proxmox to see if it clears up the slow VM's, the lastest Proxmox kernel doesnt like my Tesla p4 Gpu so have to use a previous version.. :(
yes, sandboxes
Thank you for your comment
What about resizing an encrypted system partition / volume? Do you have a procedure for that yet? I'm trying to work one out. What I know so far is that using Gparted to move it doesn't break the bootloader, but does bork the windows boot process, presumably because the offset to the EFI / boot directory has changed. This theory is reinforced by the fact that moving the partition back to the exact cylinder start stops where it was previously positioned on the disk restores the boot process with no additional repair steps. For that reason, I wouldn't expect a Header Restore to fix that particular problem. Perhaps a VeraCrypt Recovery Disk to repair the EFI entries? Still testing... Let me know if you have a solution to this.
Haven’t tried it yet
Crowdstrike need to watch this. :(
This is not related to the issue they had
Unfortunately now defender blocks the last command(
This vulnerability was fixed about a year ago
Big thx
My pleasure! More videos in this series are coming soon!
Big thx for the tutorial
My pleasure! More videos in this series are coming soon!
You can also check the loaded modules inside of your process instead of looking for a dir. simply checking -> tasklist /m /fi "imagename eq process.exe" and if it has SbieDll.dll then exit.
Nahh dude don't be teaching people that
For education purposes only! Use this to build better security for your organization.
thank you very much for this video!
Glad it was helpful!
Super + Enter
Thank you for your comment
Cool you showed us how to tell if its sandboxed not how to bypass.... Also the thing is fucking useless js.
If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing
So I only have to gain access to the mahcine, install this program, run it, let it identify it's a sandbox environment, and then I suddenly have gained access to their host mahcine? Genius!
If you check out the full video you can learn more about the technique itself. This was just an example to show the concept.
And I thought virtual machines were safe to test malware, thank you for showing me this.
You're welcome!
does it also detect if you run a sandbox in a sandbox?
Doubt
It should depending on the situation. You can check out the full video for a more technical explanation.
Hey real offensive security specialist here. This is fing useless
Yes, cap. That's the point.
If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing
i like the part where you tell us how they bypass after detecting a sandbox
If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing
I hope you find the second part more insightful: Sandbox Evasion - Stage 2 ua-cam.com/video/j4LhFmsXHFw/v-deo.html
Do it with more complex password. Using symbols, characters, uppercase, lowercase
Absolutely! Working on a separate video for that.
hello, very interessant and you explain things well. We are waiting the next video please
Thank you!
please can i have your email
Please speak to a service provider.
hello, I'm lucky to come across your video, first of all I thank you.Please I need your help, I am actually on a project in which I should deploy packetfence in my company network, my main difficulty is how to integrate RADIUS or a mechanism to identify all devices that connect to my network initially
Please speak to a service provider.
Please speak to a service provider.
I do actually want to know more about wire shark.
Hopefully, I will be able to create deeper dive videos soon
TBH that's a bomb video. Excellent video, right what I needed
Thank you for your support!