InfoSec Hub
InfoSec Hub
  • 163
  • 202 612
Using Kali Linux in combination with Proxmox
Using Kali Linux in combination with Proxmox
Переглядів: 64

Відео

Channel Update: January 2025
Переглядів 1628 днів тому
Sign of life; work in progress fixing the home network and legacy systems.
Secure WordPress Hosting
Переглядів 102 місяці тому
Secure WordPress Hosting
Identity And Access Management IAM:IGA Explained
Переглядів 583 місяці тому
Identity And Access Management IAM:IGA Explained
Implementing Cyber Security Measures & Continual Reviews
Переглядів 293 місяці тому
Implementing Cyber Security Measures? Follow these steps to make your projects a success.
My First 3 Years As a Security Officer
Переглядів 225 місяців тому
My First 3 Years As a Security Officer
My PfSense Machine
Переглядів 526 місяців тому
My PfSense Machine
Attacking Vulnerable Systems With the Use Of Kali Linux
Переглядів 1046 місяців тому
Hope to be dropping more video's about this in September/October 2024
Common Types Of Attack Vectors
Переглядів 747 місяців тому
Common Types Of Attack Vectors
How To Design Secure Systems
Переглядів 388 місяців тому
How To Design Secure Systems
What is Vulnerability Scanning And Pentesting About
Переглядів 2310 місяців тому
What is Vulnerability Scanning And Pentesting About
Channel Update February 2024
Переглядів 2011 місяців тому
Channel Update February 2024
Top 8 Types Of Cyber Attacks
Переглядів 133Рік тому
Top 8 Types Of Cyber Attacks
InfoSec Hub January 2024 Update
Переглядів 30Рік тому
InfoSec Hub January 2024 Update
Shodan - iOT Vulnerability Scanner -Update October 2023
Переглядів 133Рік тому
New features available
Back On My Comptia Security+ - October 2023
Переглядів 18Рік тому
Back On My Comptia Security - October 2023
What is Content Delivery Network (CDN) All About?
Переглядів 52Рік тому
What is Content Delivery Network (CDN) All About?
Channel Update August 2023
Переглядів 153Рік тому
Channel Update August 2023
What Is Open source intelligence - OSINT
Переглядів 100Рік тому
What Is Open source intelligence - OSINT
Most Common Types Of Password Attacks
Переглядів 56Рік тому
Most Common Types Of Password Attacks
The European CyberBunker
Переглядів 1,8 тис.Рік тому
The European CyberBunker
The SpamHouse Project & Someonewhocares.org
Переглядів 51Рік тому
The SpamHouse Project & Someonewhocares.org
Exchange Online Protection (EOP)
Переглядів 390Рік тому
Exchange Online Protection (EOP)
What Is DNS Hijacking About?
Переглядів 370Рік тому
What Is DNS Hijacking About?
Secure Coding Explained
Переглядів 26Рік тому
Secure Coding Explained
The OSI Model Explained
Переглядів 35Рік тому
The OSI Model Explained
Red Team & Blue Teams in InfoSec
Переглядів 26Рік тому
Red Team & Blue Teams in InfoSec
Time It Takes A Hacker To Brute Force Your Password in 2023
Переглядів 711Рік тому
Time It Takes A Hacker To Brute Force Your Password in 2023
What Is Keylogging About
Переглядів 28Рік тому
What Is Keylogging About
Best Practices for Securing Your Home Network
Переглядів 124Рік тому
Best Practices for Securing Your Home Network

КОМЕНТАРІ

  • @ISCCS1
    @ISCCS1 8 днів тому

    Good will commentaries: 1: Improve your inttro, 2: Explain the target of the video and the reason WHY TO WATCH, 3: Put a lot of energy to your voice., 4: Invite to suscribe and Hit the bell for Notifications. HAVE A GREAT DAY.

  • @ndochampp6503
    @ndochampp6503 16 днів тому

    Brother what if i set it like this: Pfsense : Adapter 1 - Bridged Adapter 2 - internal Network Ubuntu: Adapter 1 - Internal Network After this, will pfsense will be able to give a IP to Ubuntu with the same 192.168.1.x subnet and will I have internet connection?

  • @mrswagie-jq2tu
    @mrswagie-jq2tu Місяць тому

    W rizz gyattttt

  • @meridaConstantinos
    @meridaConstantinos Місяць тому

    👍👍👍

  • @xpusostomos
    @xpusostomos Місяць тому

    Of course, the numbers only, or say lowercase only crack numbers assume that the cracker knows or suspects they are numbers or lowercase only, and tries those combinations first. Which they may well do, although I doubt they'd be trying 12 character numbers, anybody with a code that long is unlikely to be numbers only. In principle you could have a special symbols only password which is about as strong as a lower case only password... although that's so rare that it's hard to imagine a cracker trying all the symbols first.... in which case it's as hard as the hardest column of lower/upper/symbols/numbers. Technically what symbols you use makes no difference to the time to crack, it only makes a difference because of the psychology of humans that crackers know....

  • @senzyy46
    @senzyy46 2 місяці тому

    hi sir, I have tried but have a problem where when I do testing why the source is always 192.168.1.1, what's wrong? The destination is correct.

  • @sanjeevinteli
    @sanjeevinteli 3 місяці тому

    how can do it on frontend, in reactjs webapp?

  • @mikeo3382
    @mikeo3382 4 місяці тому

    I want to use pihold but cant find your video

    • @infosec_hub
      @infosec_hub 3 місяці тому

      One of my first video's, still on the channel

  • @Daylan_S
    @Daylan_S 5 місяців тому

    Great explanation of a DMZ. This was just what I was looking for, clear and concise. Thank you.

  • @altingjoka5820
    @altingjoka5820 5 місяців тому

    where you installing this from? what is the website?

  • @stephan109
    @stephan109 5 місяців тому

    Nice video's! Found your channel in my journey learning about infosec. Great that you are sharing your knowledge with future infosec colleagues :)

  • @bebewold
    @bebewold 5 місяців тому

    Dynamic DNS client is not to see which client is using you DNS.... It is to make a public DNS record point to your pfsense public IP. It is especially useful when your ISP is giving you a dynamic IP which can change over time (usually every reconnection where I am from)

  • @ecotts
    @ecotts 7 місяців тому

    Viewers Please Note: This video is now outdated. If you setup your OPNsense IDS/IPS like this now it work properly and you will receive constant errors. You need to use the POLICY option now.

    • @infosec_hub
      @infosec_hub 7 місяців тому

      Thanks for your comment, helpful

  • @Sanazubair582
    @Sanazubair582 8 місяців тому

    What

  • @michaeltheisen
    @michaeltheisen 8 місяців тому

    Hello! Nice video. I wrote my own program to use a keylogger like this on myself for a fun quick project. The moment I saved the python file to the desktop, it was auto-deleted in about half a second by Windows Defender! lol. I had to redo it on a linux VM and it worked there. cool!

  • @lgiraq5918
    @lgiraq5918 11 місяців тому

    thanks sir!

  • @GarfieldKartPMC
    @GarfieldKartPMC 11 місяців тому

    1:43 well done mentioning propaganda

    • @JohnsPrime
      @JohnsPrime 2 місяці тому

      "Very inclusive" usually means "no white male"

  • @RamSwarup
    @RamSwarup Рік тому

    Thanks for the detailed video.

  • @232tt80
    @232tt80 Рік тому

    this helped increase my understanding of the OSI model, thank you !!

  • @ezOqekuRitusohI
    @ezOqekuRitusohI Рік тому

    Everything over 100 years should be green. Are you really going to care if someone cracks your password after you die?

    • @infosec_hub
      @infosec_hub Рік тому

      The real infosec geek would say yes, but you are right by the time you crack the password the website probably does not exist anymore or we consume information in a different form.

  • @St1mi
    @St1mi Рік тому

    Hey you're a great help thank you! Quick question, what are the netwoprk settings that need to be set for Ubuntu then?

  • @keetam_worth82
    @keetam_worth82 Рік тому

    It seems you are quite unclear about what you are talking about.

  • @ChandanaLiyanagamage
    @ChandanaLiyanagamage Рік тому

    Very interested

  • @alexfarias6175
    @alexfarias6175 Рік тому

    worse video tutorial ever!

  • @piratimir1101
    @piratimir1101 Рік тому

    What was your website about?

  • @piratimir1101
    @piratimir1101 Рік тому

    The information is presented in a very easy-to-absorb way. Keep up the excellent work on information security man. I subscribed. I'm just waiting for more.

    • @infosec_hub
      @infosec_hub Рік тому

      Appreciate it, I will continue posting

  • @rben828
    @rben828 Рік тому

    Hello, The "Block private networks" option is typically enabled on the WAN interface. This prevents traffic from private IP addresses (which should usually be confined to the LAN) from entering the WAN, where it could pose a security risk. Enabling this on the LAN interface would typically not make sense, as it would block traffic within your own private network, where such addresses are commonly used. To prevent unauthorized access to the firewall management within the LAN, you would implement access controls, such as: Restricting Access by IP Address, Using Strong Authentication and Firewall Rules. Your concern is a valid one, and these measures would be part of a comprehensive security approach.

  • @VorlMaldor
    @VorlMaldor Рік тому

    what is the hardware required to meet those brute force times?

    • @infosec_hub
      @infosec_hub Рік тому

      You would need a 'supercomputer' to reach these times. Or at least a big cluster of dedicated machines to crack passwords.

  • @Netpro187
    @Netpro187 Рік тому

    Another question is why they are not arrested, or is it just a fake site 🤔🤔

  • @Netpro187
    @Netpro187 Рік тому

    Thank you very much, I would like to ask you to explain some basics to be a hacker. Thank you

  • @jennifernorman9655
    @jennifernorman9655 Рік тому

    A good reminder to conserve my privacy, thank you 😊

  • @rfrancoi
    @rfrancoi Рік тому

    Thank you Sir. Very informative.

  • @noeljrrafols1748
    @noeljrrafols1748 Рік тому

    Where can you see the alarm notification?

  • @richburmond6761
    @richburmond6761 Рік тому

    Plus u cant ping a website 200.000 times a second :D

  • @purrrfectnarrative5201
    @purrrfectnarrative5201 Рік тому

    Have you heard of a mare called feminism

    • @infosec_hub
      @infosec_hub Рік тому

      Yes, but don't believe everything you read ;)

    • @purrrfectnarrative5201
      @purrrfectnarrative5201 Рік тому

      @@infosec_hub Yes! I read feminism is good for society and IT;)

  • @katarzynasiegert1030
    @katarzynasiegert1030 Рік тому

    Mybe you know the answer. Is network team should be responsible for Email security gateway? Or someone from security?

    • @infosec_hub
      @infosec_hub Рік тому

      I think e-mail security and network security are two different things. Yes you can block sender on IP or domain basis, but it also has to do with raising awareness inside the company so that people report dodgy e-mail towards the security department.

  • @Martin-ot7xj
    @Martin-ot7xj Рік тому

    thankyou

  • @muhammadaamir566
    @muhammadaamir566 Рік тому

    I want to pass some users/alias from OpenDNS server and some users/alias from Google DNS server and restrict them through only their specified DNS's. Is this possible? How?

  • @d3mist0clesgee12
    @d3mist0clesgee12 2 роки тому

    Nice thanks, anyupdate on the new version? Thanks again.

  • @TheChadXperience909
    @TheChadXperience909 2 роки тому

    Incorrect. Why would you have your DNS server listen for requests on the WAN interface for? Are you wanting to serve the entire internet? Did you open the port to allow that traffic? This guy has no idea what he's even talking about.

    • @infosec_hub
      @infosec_hub 2 роки тому

      Just wanted to do something for humanity by creating a public DNS server, some people just cannot see you win.

  • @Bateman0983
    @Bateman0983 2 роки тому

    Title is misleading. This is about how to set up opendns for encrypted dns. This has nothing to do with setting up a dns resolver. You point at dynamic dns, which does allow for hosting your domain dns, but does not have anything to do with a dns resolver.

    • @AinzOoalG0wn
      @AinzOoalG0wn Рік тому

      is there a different video that explains how to setup own dns resolver for opnsense?

    • @Bateman0983
      @Bateman0983 Рік тому

      @@AinzOoalG0wn I haven't seen a good one, yet, but after pulling my hair out, I just set up pihole + nginx proxy manager in docker. Then I point the dns in opnsense to the pihole. Pihole = DNS + less ads. pihole uses dnsmasq dns server, which is available in opnsense, but I haven't worked out how to do it. It was recently updated though. .

    • @Bateman0983
      @Bateman0983 Рік тому

      @@AinzOoalG0wn This one might work for you ua-cam.com/video/h2_cQxTkh3Q/v-deo.html

  • @jaxon161
    @jaxon161 2 роки тому

    🙄 *Promo sm*!

  • @harumangveersinghmatharoo4500
    @harumangveersinghmatharoo4500 2 роки тому

    can we add snort to the opnsense firewall and how to do that

  • @obas-plays6059
    @obas-plays6059 2 роки тому

    How do i implement this on the frontend...

  • @agfisher007
    @agfisher007 2 роки тому

    How do i block an IP address found on NETSTAT

    • @infosec_hub
      @infosec_hub Рік тому

      Either on your pc itself with a software firewall or in your router for all clients on your network.

  • @Michael-sn7if
    @Michael-sn7if 2 роки тому

    What does the command "netstat -an" do? How do I know which IP address is which?

    • @piratimir1101
      @piratimir1101 Рік тому

      It lists all connections, those in ESTABLISHED and LISTENING state. To know IPs you have to do information gathering my friend.

  • @corruptedroblox9020
    @corruptedroblox9020 2 роки тому

    i think my 48 letter password is secure

  • @extremaletrem4354
    @extremaletrem4354 2 роки тому

    thx

  • @franksemi_modular
    @franksemi_modular 2 роки тому

    IPS have nothing to do with ISP and load balancer. Seams you never worked with IPS before. I hate when non professonals trying to make howto videos and fail af half of the things.

    • @infosec_hub
      @infosec_hub 2 роки тому

      I do not claim to be a network security pro, I am aware of the concept of these tools that people can download and run to protect their home/business network. I am familiar with the software and want to show people with interest what is possible. I never stated I have all the answers. If you take a look at my channel you see it is about infosec in general. Sorry that you did not find what you where looking for sir.

  • @bbrendon
    @bbrendon 2 роки тому

    Your descriptions of some of the features are wrong. Probably best to review the docs again.