- 36
- 657 512
LS111 Cyber Security Education
United States
Приєднався 12 гру 2021
Hey all! I created this educational channel to showcase the cyber security craft and document my adventures as I learn cool new things along the way! There is a serious shortage of cyber security professionals worldwide at the moment, and I am hoping that those that come across this channel will find these videos of value as we share various skills and knowledge across the cyber security community.
I will be covering all the major tools and techniques around web hacking, network hacking, privilege escalation as well as defense and everything in between.
DISCLAIMER: All information, techniques and tools showcased in these videos are for educational and ethical penetration testing purposes ONLY. NEVER attempt to use this information to gain unauthorized access to systems without the EXCPLICIT consent of its owners. This is a punishable offence by law in most countries.
I will be covering all the major tools and techniques around web hacking, network hacking, privilege escalation as well as defense and everything in between.
DISCLAIMER: All information, techniques and tools showcased in these videos are for educational and ethical penetration testing purposes ONLY. NEVER attempt to use this information to gain unauthorized access to systems without the EXCPLICIT consent of its owners. This is a punishable offence by law in most countries.
Zenarmor 1.16: Your Ultimate Weapon for Unbeatable Cyber Security Protection
NOTE: This video is sponsored by Zenarmor and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription.
We have reached the end of another successful year at Zenarmor, with the third and final major release of Zenarmor for 2023 ready for you to download. Like with all the previous major releases this year, Zenarmor 1.16 includes new, fresh capabilities and tools that will ultimately help you create a formidable defense against bad actors and improve your overall network security posture, regardless of where you choose to deploy Zenarmor, on-prem or in the cloud.
In this release, we are proud to introduce a new device identification and management capability, giving you improved visibility and control of the devices using your network, as well as Community ID flow hashing support to easily correlate device logs with connection logs, giving you full end-to-end visibility of the process on the device initiating the connection on your network to its final destination on the internet.
In addition, almost every module of Zenarmor has had an improvement or general bug fix, so let's take a closer look at what you can expect from this feature-packed edition of Zenarmor 1.16
P.S. Please don't forget to like and subscribe!
🔗Sign up link: sunnyvalley.cloud/?r=SVNRUZSU4GWKM🔗
If you are new to Zenarmor check this playlist first to get started:
Zenarmor Playlist:
ua-cam.com/video/uQbcwu-f9B0/v-deo.html
Comprehensive 1.16 Blog post:
www.zenarmor.com/post/not-just-an-update-zenarmor-1-16
Deep Dive Community ID Blog Post and Video:
ls111.me/threat-hunting-made-easy-using-the-community-id-network-flow-hashing-capabilities-built-into-zenarmor-and-elk-elasticsearch-logstash-and-kibana/
DISCLAIMER: All information, techniques, and tools showcased in these videos are for educational and ethical penetration testing purposes ONLY. NEVER attempt to use this information to gain unauthorized access to systems without the EXPLICIT consent of its owners. This is a punishable offense by law in most countries.
#zenarmor #zenarmor116 #ITAM #communityid
We have reached the end of another successful year at Zenarmor, with the third and final major release of Zenarmor for 2023 ready for you to download. Like with all the previous major releases this year, Zenarmor 1.16 includes new, fresh capabilities and tools that will ultimately help you create a formidable defense against bad actors and improve your overall network security posture, regardless of where you choose to deploy Zenarmor, on-prem or in the cloud.
In this release, we are proud to introduce a new device identification and management capability, giving you improved visibility and control of the devices using your network, as well as Community ID flow hashing support to easily correlate device logs with connection logs, giving you full end-to-end visibility of the process on the device initiating the connection on your network to its final destination on the internet.
In addition, almost every module of Zenarmor has had an improvement or general bug fix, so let's take a closer look at what you can expect from this feature-packed edition of Zenarmor 1.16
P.S. Please don't forget to like and subscribe!
🔗Sign up link: sunnyvalley.cloud/?r=SVNRUZSU4GWKM🔗
If you are new to Zenarmor check this playlist first to get started:
Zenarmor Playlist:
ua-cam.com/video/uQbcwu-f9B0/v-deo.html
Comprehensive 1.16 Blog post:
www.zenarmor.com/post/not-just-an-update-zenarmor-1-16
Deep Dive Community ID Blog Post and Video:
ls111.me/threat-hunting-made-easy-using-the-community-id-network-flow-hashing-capabilities-built-into-zenarmor-and-elk-elasticsearch-logstash-and-kibana/
DISCLAIMER: All information, techniques, and tools showcased in these videos are for educational and ethical penetration testing purposes ONLY. NEVER attempt to use this information to gain unauthorized access to systems without the EXPLICIT consent of its owners. This is a punishable offense by law in most countries.
#zenarmor #zenarmor116 #ITAM #communityid
Переглядів: 2 065
Відео
Unleashing the Power of Zenarmor, ELK & Community ID - Hunting for Cyber Threats
Переглядів 1,6 тис.Рік тому
NOTE: This video is sponsored by Zenarmor and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! The official release of Zenarmor 1.16 is just around the corner, promising some exciting new capabilities. Today, we will take a sneak peek at one of the new capabilities introduced in this rel...
The shocking truth behind migrating from pfSense to OPNsense - Important contemplation before you do
Переглядів 20 тис.Рік тому
NOTE: This video is sponsored by Zenarmor and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! So you likely found this video because you run pfSense in your home lab or rely on it to secure your business network. You have probably heard all the chatter on Reddit and UA-cam about the rec...
Demystifying Zenarmor and Datadog SIEM Integration: The Ultimate MSSP and Business User's Guide
Переглядів 910Рік тому
To continue with the series of Zenarmor SIEM integration guides that I have created over the last few months, today we are going to look at how we can integrate Zenarmor with Datadog by making use of RSyslog. Datadog is slightly different from the previous SIEMs we have covered because it's the only one that is a SaaS-only solution, meaning we can't self-host this solution as we covered in the ...
Zenarmor 1.15 just released🔥- New features and UI improvements!
Переглядів 1,2 тис.Рік тому
NOTE: This video is sponsored by Zenarmor and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! In this video, I will give you a quick introduction to Zenarmor 1.15 offering some important new and improved capabilities with a focus on providing a better-performing dashboard experience ove...
Wazuh SIEM & Zenarmor NGFW Integration using Syslog
Переглядів 11 тис.Рік тому
NOTE: This video is sponsored by Zenarmor and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! In this video, we are going to integrate Zenarmor NGFW with the open-source Wazuh SIEM/SDR by ingesting Syslog messages generated by Zenarmor. I will walk you through the setting up of custom W...
Zenarmor 1.14 just launched! 🚀- BIG OPNsense visual & functional dashboard improvements.
Переглядів 770Рік тому
NOTE: This video is sponsored by Zenarmor and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! In this video, I will give you a quick introduction to Zenarmor 1.14 and the BIG visual and functional improvements that have been made to the OPNsense dashboard to manage this NGFW product. Th...
How to Integrate Zenarmor with Microsoft Active Directory - MSP and Business Users Guide
Переглядів 1,1 тис.Рік тому
NOTE: This video is sponsored by Sunny Valley Networks and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! In this video, we are going to explore how we can use an existing Microsoft Active Directory (AD) setup, integrated with Zenarmor, to create a powerful and robust content-filtering...
How to Integrate Wazuh & TheHive - Virtual Lab Building Series Ep: 13
Переглядів 14 тис.Рік тому
Welcome to my channel! In Episode 13 we will continue building our lab Security Operations Center (SOC) and I am going to show you how to integrate Wazuh, our open-source SIEM platform, with The Hive, our security incident response platform (SIRP) so that we can feed alerts into The Hive allowing analysts to easily, filter and action these created alerts. Understanding and having hands-on exper...
Zenarmor INSIDER NEWS - Netmap driver improvements & why the company changed its name
Переглядів 932Рік тому
NOTE: This video is sponsored by Sunny Valley Networks and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! In this video, we are going to explore what is happening behind the curtain at Zenarmor, we are going to talk about the recent name change and company rebranding from Sunny Valley ...
How to create an L2 bridge using Netplan & install Zenarmor on Ubuntu 22.04
Переглядів 2,3 тис.Рік тому
NOTE: This video is sponsored by Sunny Valley Networks and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! In this video, I am going to firstly show you how to bridge two network interfaces in Ubuntu 22.04 and secondly how we can use Zenarmor to inspect and filter traffic traversing the...
What's new in Zenarmor 1.13 - An MSP & Enterprise decision-makers guide
Переглядів 1,6 тис.Рік тому
NOTE: This video is sponsored by Sunny Valley Networks and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! In this video, we explore the greatly anticipated release of Zenarmor® 1.13 which has just arrived and offers important new and improved capabilities that both technical and busine...
How VirtualBox 7.0 networking works - NAT, NAT Network, Internal Network, Bridged Adapter
Переглядів 59 тис.Рік тому
Hi and welcome to my channel! In this tutorial, we are going to look at VirtualBox networking modes where I will explain how NAT, NAT Network, Internal Network, and Bridge Adapter network modes work as well as provide examples for each use case. I created this video to supplement my cyber security virtual lab building series because I saw many people running into issues with the VirtualBox netw...
Improve your cyber security using Zenarmor - an MSPs guide to creating value & income streams
Переглядів 2,7 тис.Рік тому
NOTE: This video is sponsored by Sunny Valley Networks and I do receive a small percentage back for every referral that signs up using the link, which gets put towards my Zenarmor subscription. Welcome to my channel! If you are aspiring to run your own managed services provider (MSP) business or already operate one, there has never been a more exciting time for MSPs than present. With more busi...
How to use a cloud-deployed Zenarmor SWG to secure cloud resources & users in a SASE architecture.
Переглядів 1,8 тис.Рік тому
Welcome to my channel! In this video we are going to explore the idea of using Zenarmor as a secure web gateway (SWG) as part of a basic DIY Secure Access Service Edge (SASE) architecture. My previous videos have been focused mainly on on-prem/home deployments of the Zenarmor Next-Gen Firewall (NGFW), however, today we are going to step into the realm of cloud security, and explore how we can u...
How to benefit from Zenarmor NGFW protection anywhere using OPNSense and Zerotier
Переглядів 7 тис.2 роки тому
How to benefit from Zenarmor NGFW protection anywhere using OPNSense and Zerotier
How to enable Cortex analyzers - Virtual Lab Building Series: Ep12
Переглядів 7 тис.2 роки тому
How to enable Cortex analyzers - Virtual Lab Building Series: Ep12
UPDATED - TheHive, MISP & Cortex Integration - Virtual Lab Building Series: Ep11.5
Переглядів 9 тис.2 роки тому
UPDATED - TheHive, MISP & Cortex Integration - Virtual Lab Building Series: Ep11.5
How to use CrowdSec on OPNSense including a NAXSI WAF integration.
Переглядів 14 тис.2 роки тому
How to use CrowdSec on OPNSense including a NAXSI WAF integration.
OPNSense - Web Application Firewall (WAF) configuration using NAXSI
Переглядів 29 тис.2 роки тому
OPNSense - Web Application Firewall (WAF) configuration using NAXSI
DNS Over TLS on OPNSense - Extra Online Privacy Using Encryption
Переглядів 17 тис.2 роки тому
DNS Over TLS on OPNSense - Extra Online Privacy Using Encryption
Zenarmor Next-Gen Firewall - Exploring the advanced security features & paid subscription
Переглядів 16 тис.2 роки тому
Zenarmor Next-Gen Firewall - Exploring the advanced security features & paid subscription
How to Integrate Cortex & MISP with TheHive in your SOC - Virtual Lab Building Series: Ep11
Переглядів 21 тис.2 роки тому
How to Integrate Cortex & MISP with TheHive in your SOC - Virtual Lab Building Series: Ep11
TheHive, Cortex & MISP Installation Using Docker Compose - Virtual Lab Building Series: Ep10
Переглядів 34 тис.2 роки тому
TheHive, Cortex & MISP Installation Using Docker Compose - Virtual Lab Building Series: Ep10
Wazuh SIEM & XDR Agent Installation - Virtual Lab Building Series: Ep9
Переглядів 33 тис.2 роки тому
Wazuh SIEM & XDR Agent Installation - Virtual Lab Building Series: Ep9
Intro to Cyber Security Operations (SOC) - Blue vs Red Team - Virtual Lab Building Series: Ep8
Переглядів 12 тис.2 роки тому
Intro to Cyber Security Operations (SOC) - Blue vs Red Team - Virtual Lab Building Series: Ep8
How to switch from XFCE to GNOME 42 on Kali Linux 2022.2
Переглядів 39 тис.2 роки тому
How to switch from XFCE to GNOME 42 on Kali Linux 2022.2
OPNSense - Unlock Next-Generation Firewall features with Zenarmor - Virtual Lab Building Series: Ep7
Переглядів 20 тис.2 роки тому
OPNSense - Unlock Next-Generation Firewall features with Zenarmor - Virtual Lab Building Series: Ep7
OPNSense Firewall Multi-WAN Failover and Load Balancing - Virtual Lab Building Series: Ep 6
Переглядів 27 тис.2 роки тому
OPNSense Firewall Multi-WAN Failover and Load Balancing - Virtual Lab Building Series: Ep 6
OPNSense Firewall High Availability (HA), CARP, pfSync Config - Virtual Lab Building Series: Ep 5
Переглядів 21 тис.2 роки тому
OPNSense Firewall High Availability (HA), CARP, pfSync Config - Virtual Lab Building Series: Ep 5
After I unchecked the Offloading options, I was unable to connect to the Opnsense GUI on Kali. I noticed on the Opnsense VM I keep getting this message when I try to connect: 152.063059 [4308] netmap_transmit em1 drop mbuf that needs checksum offload How can I fix this? Anyone know?
Huzzit Bru! - Awesome Vid - btw where's ur Discord Server?
🍻
Engine-x. No idea what you are calling it, boet.
what if i only have one network adapter
HI everyone, i was following the guide step by step, however, when I try to install the rule in opnsense it doesn't appear in downloads. Does anyone have the same problem? The file is shown in the FileZilla file location.
hello sir, could you help make video on how to integrate wazuh v 4.9.2 with misp ,please?
Very good and informative video! It helped me to understand and to chiise the option I needed.
Thanks
Do I need to enable NAT Network's and LAN's promiscious mode on the backup firewall too?
Can you make a video how to whitelist a false positive (preferably with synology apps as a backend)?
Timestamps: 0:47 NAT 3:48 NAT Network 5:33 Internal Network 7:15 Bridged Adapter 8:42 Lab environment
I have followed all steps properly but in cortex i can see 0 analysers (I have switched user, its not admin) I think the step of adding analyzers is missed
Hi Sir, I encounter some problem at downloading the acls part which is after that the edit blacklists section categories does not appear anything. Hope you can reply :)))
Thank you so much!
good vid that gives an overview of the service. For those that do not want to follow all the manual steps you can also select one of the preexisting scan rules that already exist in opensence ids
Thank u so much for this excellent tutorial. I was getting nowhere figuring it out....immediate subscribe afterwards!! 🤩🤩
Hi! Why I cant see the analyzers section in Cortex?
OR JUST USE QUAD 9!
To the people who are stuck at the point where you have to run kali on the eth1 same as the subnet of opnsense. I recommend going to chatgpt and using VBoxManage to delete the intnet which is setup by default and setting up a new intnet with dhcp enabled using the same ips mentioned in the video. With a netmask of 24 bits. Then it will work fine.
Thanks alot but gettign along finlly it didnt work for me still not blocking social sites as its ought to do followed all steps.
awsome video
In promiscuous mode, an IPS sensor analyzes a copy of the traffic instead of the actual packet. This allows the IPS to detect an attack and send an alert, but it can't stop the attack from entering the network.
tried setting a static ip for wazuh but it doesnt work, it works only when i allow it to use the dhcp server assigned ip from host machine, how did you configure your virtual switch for it
Hi thanks for such a nice vide series appreciate all the help . I am gettign along however stuck on configuring assign interface for OPNsense. I am using default virtual box 10.0.2.0/24 CIDR and gane 10.0.2.254 for interface but its not working and not rewachbale form kali machine any help or gudiace ? thanks
Thanks for this video. Helped me out nicely.
Hello! First, I would like to thank you for the awesome videos. I am currently following your lab series. If I want to apply this WAN failover on top of the previous labs so far, namely the HA firewalls, do I need to create a new firewall like in this video? Or do I just follow these steps and apply them on the HA firewalls?
Wait do you need the bzip2 download if you are using a MacBook. I see the file is HUGE, will the bzip2 work MacOS?
Works perfect! :D
could you help me, when i ping the VIP of WAN, i got request timeout? so where is you get the ip 10.0.2.254?
please give me explanation about integration zenarmor with splunk
great breakdown, very helpful and well produced.
With NAT Network interface enabled, my VMs connect to each other but I can never access the internet. Am I missing something?
Make sure "Cable Connected" is checked in network settings and also check the network gateway if that doesnt work
@@funnynumber69420 Thanks for your input! Cable connected is checked indeed.
After some trials and errors, I made it work. Thanks
Kinda confuse , the rule was for suricata was there didnt show how to create as well with the pro telemetry thing not sure if we need to create another VM with it or how to integrate to current OPNSENSE
Please update thehive relative path in your new docker-compose.yml as well. Then then will be no need to update docker-compose.yml again manually.
Everything works fine Thanks 👌
I need a Bridged connection! That's all it was. All this time watching other videos being taught to use a Host-only connection with carefully chosen static IP addresses and the firewalls turned off! I can't believe it's working now! Thank you!
Hi! thank you for this video it was really helpful, but I got stocked at some point after everything the container refused to load setting the thehive to latest version meanwhile changing the version to 5.2 it load up but both cortex and misp refused to authenticate see attached
Can you tell us how a rule would look like for redirecting traffic to unbound?
I just embarked upon a networking journey, and this video has taught me a lot! Thanks!
This is absolute gold
Can you help. How to configure minio to be able to save the attachment on theHive
My host device is windows 11. I have a VPN that allows me to connect to internal infrastructure that is not open to the public. I have a Kali in my VM machine with the network set bridges adapter. The problem is I cannot tested or connect to internal infrastructure to test the security of servers etc. is there a way around this?
How do you enable Analyzers and Responders to appear in Cortex? This step-by-step guide is not shown in the videos, they are already enabled on your screen. In my configuration they do not appear
Completely agree... Sir, please let me know if you got any solution Thank you
Great explanation.. Really appreciate the good work
I like this guide, it give me more understanding about the WAF in Opnsense. But I don´t understand how to create a whitelist from false positives whit the info I got from the logs.
thanks alot for this amazing explanation
error on authentication, what is the issue?
This content is a real gem. Thanks a lot for it!