Tom BH
Tom BH
  • 40
  • 82 855
AlienVault OSSIM - Installation
In this video we will install AlienVault OSSIM Server!
Help support the channel with a like, comment & subscribe!
Links:
cybersecurity.att.com/products/ossim
Disclaimer and Warning:
The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity.
Viewers are advised to comply with all applicable laws and regulations in their jurisdiction.
By watching this video, viewers agree to take full responsibility for any actions they may take as a result of the information presented.
Viewers are encouraged to conduct their own research and seek professional advice where appropriate as needs may vary based on individual circumstances.
I offer no warranty or guarantee of any kind regarding the accuracy, completeness, or reliability of the information presented in this video.
I do not accept any responsibility or liability for any direct or indirect loss or damage or consequences (whether in tort, contract or otherwise) which may be suffered or occasioned by any person howsoever arising due to any inaccuracy, omission, misrepresentation, or error in respect of any information and content provided by this video including any third-party websites or vendors or tools mentioned.
This video is not affiliated with, endorsed by, or sponsored by my current, past, or future employers or businesses nor does it reflect the views or opinions of any organization with which I may be associated.
Переглядів: 76

Відео

AlienVault OSSIM - Overview
Переглядів 5721 день тому
In this video we will take an overview of AlientVault OSSIM! Help support the channel with a like, comment & subscribe! Links: cybersecurity.att.com/products/ossim Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulat...
Tails and TOR
Переглядів 453Місяць тому
In this video we will learn how TOR works and take a look at the Tails OS! Help support the channel with a like, comment & subscribe! Links: Tails - tails.net TOR - www.torproject.org TOR nodes - www.dan.me.uk/tornodes Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are...
Sandbox Evasion - Stage 2
Переглядів 1164 місяці тому
In this video we will see sandbox evasion (Sandboxie) Help support the channel with a like, comment & subscribe! Links: sandboxie-plus.com Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdictio...
Sandbox Evasion
Переглядів 1494 місяці тому
In this video we are going to talk about how hackers bypass sandboxes! Help support the channel with a like, comment & subscribe! Links: github.com/a0rtega/pafish Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulati...
WSC Takeover with No Defender
Переглядів 1335 місяців тому
In this video we will demonstrate WSC takeover! Help support the channel with a like, comment & subscribe! Links: github.com/es3n1n/no-defender Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisd...
OpenEDR - Agent Deployment
Переглядів 1815 місяців тому
In this video we will deploy the first OpenEDR agent. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction....
OpenEDR - Registration
Переглядів 295 місяців тому
In this video we will register a new account with OpenEDR. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdic...
OpenEDR - Overview
Переглядів 2215 місяців тому
In this video we will take an overview of OpenEDR. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction. By...
Proxmox Mail Gateway - Updates
Переглядів 7155 місяців тому
In this video we will configure Proxmox Mail Gateway (PMG) updates and upgrades. Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdicti...
Proxmox Mail Gateway - Initial Setup
Переглядів 2,5 тис.6 місяців тому
In this video we will perform the initial Proxmox Mail Gateway (PMG) setup. Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction. B...
Proxmox Mail Gateway - Installation
Переглядів 1,1 тис.6 місяців тому
Proxmox Mail Gateway - Installation
Proxmox Mail Gateway - Overview
Переглядів 2,8 тис.6 місяців тому
Proxmox Mail Gateway - Overview
Snort - Initial Setup
Переглядів 956 місяців тому
Snort - Initial Setup
Snort - Installation
Переглядів 836 місяців тому
Snort - Installation
Snort - Overview
Переглядів 876 місяців тому
Snort - Overview
Packet Fence - Initial Setup
Переглядів 2,1 тис.6 місяців тому
Packet Fence - Initial Setup
Packet Fence - Installation
Переглядів 8986 місяців тому
Packet Fence - Installation
Packet Fence - Overview
Переглядів 2,2 тис.6 місяців тому
Packet Fence - Overview
pfSense - Initial Setup
Переглядів 836 місяців тому
pfSense - Initial Setup
pfSense - Installation
Переглядів 1287 місяців тому
pfSense - Installation
pfSense - Overview
Переглядів 1577 місяців тому
pfSense - Overview
What is a Sandbox?
Переглядів 13 тис.Рік тому
What is a Sandbox?
What is a Vulnerability Exploit?
Переглядів 249Рік тому
What is a Vulnerability Exploit?
AntiVirus Basics - Signatures Based Detection
Переглядів 1,9 тис.2 роки тому
AntiVirus Basics - Signatures Based Detection
UAC Bypass - Explanation and demonstration
Переглядів 7 тис.2 роки тому
UAC Bypass - Explanation and demonstration
What is Packet Sniffing?
Переглядів 13 тис.2 роки тому
What is Packet Sniffing?
VeraCrypt - System Partition
Переглядів 3,2 тис.4 роки тому
VeraCrypt - System Partition
VeraCrypt - Non System Partition
Переглядів 5 тис.4 роки тому
VeraCrypt - Non System Partition
VeraCrypt - Container
Переглядів 1,9 тис.4 роки тому
VeraCrypt - Container

КОМЕНТАРІ

  • @faisalhussain9746
    @faisalhussain9746 23 дні тому

    ❤❤i

  • @maryesesmithfe5068
    @maryesesmithfe5068 28 днів тому

    Cathrine Manor

  • @JobEve-v9j
    @JobEve-v9j Місяць тому

    Kemmer Trace

  • @CongreveLuther-m7g
    @CongreveLuther-m7g Місяць тому

    Fadel Mountains

  • @WatchDjc-f9p
    @WatchDjc-f9p Місяць тому

    Towne Row

  • @KingsleyAvery-r3x
    @KingsleyAvery-r3x Місяць тому

    Davonte Stravenue

  • @lkiller4788
    @lkiller4788 Місяць тому

    Nice Video, Clear and Informative. I do have i question, how does the server send back the information if it doesnt know how sent it?

    • @TomBH
      @TomBH Місяць тому

      Thanks. Server will send the traffic back using the same circuit: server to C, C to B, B to A and A to the user. As far as the web server is concerned the traffic came from the exit node (C) and that is where the response will be sent to. C knows it needs to send traffic to B and so on...

  • @mindsoffire
    @mindsoffire Місяць тому

    I can't run Start-Process

  • @BarryMartinez-q9q
    @BarryMartinez-q9q Місяць тому

    Gislason Courts

  • @NoyesIan-v5s
    @NoyesIan-v5s Місяць тому

    Kyleigh Views

  • @BurneJonesAdolph-f5e
    @BurneJonesAdolph-f5e Місяць тому

    Johns Valley

  • @JeffreyMiller-h3p
    @JeffreyMiller-h3p Місяць тому

    West Lodge

  • @GladstoneChapman-f3r
    @GladstoneChapman-f3r Місяць тому

    Krystel Mission

  • @CarrieAaron-p1o
    @CarrieAaron-p1o Місяць тому

    Powlowski Expressway

  • @JenniferTaylor-ue9rp
    @JenniferTaylor-ue9rp Місяць тому

    19102 Kovacek Motorway

  • @YTAnimation52
    @YTAnimation52 2 місяці тому

    "pretty high priviliges" with most features disabled. good vid tho!

    • @TomBH
      @TomBH Місяць тому

      Hi The fact that they are disabled doesn't mean they are not available to the user. And thank you!

    • @mkay3310
      @mkay3310 12 днів тому

      The integrity level is high, that's what matters. He can get a SYSTEM level shell and do whatever he wants on the system. He can also enable any of the privileges that are disabled.

  • @HouseCara-w4z
    @HouseCara-w4z 2 місяці тому

    Kemmer Lake

  • @JeffryRamcharan-n1z
    @JeffryRamcharan-n1z 2 місяці тому

    Kamryn Ports

  • @AnnieAyers-s9k
    @AnnieAyers-s9k 2 місяці тому

    Jarrett Dam

  • @MatthewFrith-w7u
    @MatthewFrith-w7u 2 місяці тому

    Shawna Forge

  • @DanielHall-v8v
    @DanielHall-v8v 2 місяці тому

    Luettgen Mount

  • @user-tc7yy9ec2x
    @user-tc7yy9ec2x 2 місяці тому

    Roel Tunnel

  • @SaxtonDave-p4f
    @SaxtonDave-p4f 2 місяці тому

    McLaughlin Skyway

  • @ShaynaLancz-f9i
    @ShaynaLancz-f9i 2 місяці тому

    Deborah Neck

  • @1389All-u3p
    @1389All-u3p 2 місяці тому

    Very well explained

  • @mjabd8187
    @mjabd8187 2 місяці тому

    "Transmission Control Protocol, together with Internet Protocol, forms the basis of the TCP/IP 4-layer model. These layers are conceptual frameworks that define how data should be transmitted over a network to ensure stable connections. Each layer in the model serves a different purpose. For instance, the **Network Access Layer** (the first layer) involves the physical aspects of network connections, such as the hardware responsible for data transmission. Please note, I am still under training, and the information in this comment may require further refinement or additional details."

  • @liamgibbins
    @liamgibbins 2 місяці тому

    awesome can you do some on wazuh? Its a great way to secure your network with industry standards and its FREE, or any alternative you like?

  • @liamgibbins
    @liamgibbins 2 місяці тому

    awesome playlist of videos, if you can do some on proxmox VE passing P4 PGU to containers not using the VGPU and the nvidia drivers as some have has success doing it but its not documented. I am having an issue at the moment that my VM's have started to run slow for some reason, I am using R730 SAS SSD (enterprise 1.8Gb) in HBA mode with ZFS so should be fine, I am getting another just for the Proxmox OS next month.. Doing a fresh install of proxmox to see if it clears up the slow VM's, the lastest Proxmox kernel doesnt like my Tesla p4 Gpu so have to use a previous version.. :(

  • @EricRobillard-b4j
    @EricRobillard-b4j 3 місяці тому

    yes, sandboxes

    • @TomBH
      @TomBH 3 місяці тому

      Thank you for your comment

  • @graceoverall
    @graceoverall 3 місяці тому

    What about resizing an encrypted system partition / volume? Do you have a procedure for that yet? I'm trying to work one out. What I know so far is that using Gparted to move it doesn't break the bootloader, but does bork the windows boot process, presumably because the offset to the EFI / boot directory has changed. This theory is reinforced by the fact that moving the partition back to the exact cylinder start stops where it was previously positioned on the disk restores the boot process with no additional repair steps. For that reason, I wouldn't expect a Header Restore to fix that particular problem. Perhaps a VeraCrypt Recovery Disk to repair the EFI entries? Still testing... Let me know if you have a solution to this.

    • @TomBH
      @TomBH 3 місяці тому

      Haven’t tried it yet

  • @PowerOfOne-u4h
    @PowerOfOne-u4h 3 місяці тому

    Crowdstrike need to watch this. :(

    • @TomBH
      @TomBH 3 місяці тому

      This is not related to the issue they had

  • @dd-de6gi
    @dd-de6gi 3 місяці тому

    Unfortunately now defender blocks the last command(

    • @TomBH
      @TomBH 3 місяці тому

      This vulnerability was fixed about a year ago

  • @EDG3PC
    @EDG3PC 3 місяці тому

    Big thx

    • @TomBH
      @TomBH 3 місяці тому

      My pleasure! More videos in this series are coming soon!

  • @EDG3PC
    @EDG3PC 3 місяці тому

    Big thx for the tutorial

    • @TomBH
      @TomBH 3 місяці тому

      My pleasure! More videos in this series are coming soon!

  • @distortions
    @distortions 4 місяці тому

    You can also check the loaded modules inside of your process instead of looking for a dir. simply checking -> tasklist /m /fi "imagename eq process.exe" and if it has SbieDll.dll then exit.

  • @Zigonce
    @Zigonce 4 місяці тому

    Nahh dude don't be teaching people that

    • @TomBH
      @TomBH 4 місяці тому

      For education purposes only! Use this to build better security for your organization.

  • @allhailalona
    @allhailalona 4 місяці тому

    thank you very much for this video!

    • @TomBH
      @TomBH 4 місяці тому

      Glad it was helpful!

  • @alicethegrinsecatz6011
    @alicethegrinsecatz6011 4 місяці тому

    Super + Enter

    • @TomBH
      @TomBH 4 місяці тому

      Thank you for your comment

  • @bradeagle7297
    @bradeagle7297 5 місяців тому

    Cool you showed us how to tell if its sandboxed not how to bypass.... Also the thing is fucking useless js.

    • @TomBH
      @TomBH 5 місяців тому

      If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing

  • @top0657
    @top0657 5 місяців тому

    So I only have to gain access to the mahcine, install this program, run it, let it identify it's a sandbox environment, and then I suddenly have gained access to their host mahcine? Genius!

    • @TomBH
      @TomBH 5 місяців тому

      If you check out the full video you can learn more about the technique itself. This was just an example to show the concept.

  • @owengriceactivechannel5625
    @owengriceactivechannel5625 5 місяців тому

    And I thought virtual machines were safe to test malware, thank you for showing me this.

    • @TomBH
      @TomBH 5 місяців тому

      You're welcome!

  • @Sam-tg2hq
    @Sam-tg2hq 5 місяців тому

    does it also detect if you run a sandbox in a sandbox?

    • @hodayfa000h
      @hodayfa000h 5 місяців тому

      Doubt

    • @TomBH
      @TomBH 5 місяців тому

      It should depending on the situation. You can check out the full video for a more technical explanation.

  • @Overlord176
    @Overlord176 5 місяців тому

    Hey real offensive security specialist here. This is fing useless

    • @ManyBadVids
      @ManyBadVids 5 місяців тому

      Yes, cap. That's the point.

    • @TomBH
      @TomBH 5 місяців тому

      If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing

  • @ncro-il8ur
    @ncro-il8ur 5 місяців тому

    i like the part where you tell us how they bypass after detecting a sandbox

    • @TomBH
      @TomBH 5 місяців тому

      If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing

    • @TomBH
      @TomBH 4 місяці тому

      I hope you find the second part more insightful: Sandbox Evasion - Stage 2 ua-cam.com/video/j4LhFmsXHFw/v-deo.html

  • @ryu_ge
    @ryu_ge 5 місяців тому

    Do it with more complex password. Using symbols, characters, uppercase, lowercase

    • @TomBH
      @TomBH 5 місяців тому

      Absolutely! Working on a separate video for that.

  • @ndymany4049
    @ndymany4049 5 місяців тому

    hello, very interessant and you explain things well. We are waiting the next video please

    • @TomBH
      @TomBH 5 місяців тому

      Thank you!

  • @ndymany4049
    @ndymany4049 5 місяців тому

    please can i have your email

    • @TomBH
      @TomBH 5 місяців тому

      Please speak to a service provider.

  • @ndymany4049
    @ndymany4049 5 місяців тому

    hello, I'm lucky to come across your video, first of all I thank you.Please I need your help, I am actually on a project in which I should deploy packetfence in my company network, my main difficulty is how to integrate RADIUS or a mechanism to identify all devices that connect to my network initially

    • @TomBH
      @TomBH 5 місяців тому

      Please speak to a service provider.

    • @TomBH
      @TomBH 5 місяців тому

      Please speak to a service provider.

  • @senditall152
    @senditall152 5 місяців тому

    I do actually want to know more about wire shark.

    • @TomBH
      @TomBH 5 місяців тому

      Hopefully, I will be able to create deeper dive videos soon

  • @DaniKamanovsky
    @DaniKamanovsky 6 місяців тому

    TBH that's a bomb video. Excellent video, right what I needed

    • @TomBH
      @TomBH 6 місяців тому

      Thank you for your support!