- 178
- 386 993
RedBlue Labs
Canada
Приєднався 21 вер 2011
Quick tutorial videos on CyberSecurity (RED and BLUE)!
check out RedBlue Labs merchandise!
redbluelabs.myspreadshop.ca/
check out RedBlue Labs merchandise!
redbluelabs.myspreadshop.ca/
Відео
What are Timing Intervals in NMAP?
Переглядів 9721 день тому
This is a light hearted tutorial on timing intervals in nmap scans. I also bring in wireshark so we can look at the differences :) 0:00-0:22 Intro 0:23-5:00 Scanning 5:01-10:02 Validating with Wireshark
Full Zenmap Course!!
Переглядів 814Місяць тому
In this video you will notice right away it's fairly long. That is because I did a deep dive into the different areas of zenmap. I have broken the video up into three sections; GUI,Topology and profiles. Summary breakdown: part 1 GUI. - show all menu options with examples -conduct scans -compare scans -filter hosts -import previously made scans part 2 Topology -All the different options to do w...
Scrub Confidential Data from Network Captures
Переглядів 995Місяць тому
Removing confidential information from a pcap! redbluelabs.myspreadshop.ca/
5 Essential Wireshark Tips I Learned the Hard Way
Переглядів 1062 місяці тому
Wireshark is one of my favourite tools. Here is a list of things that would have made my life much easier if I had known them from the beginning. redbluelabs.myspreadshop.ca/
TCPDUMP Essential Commands for Hackers
Переглядів 6492 місяці тому
It's crazy how useful this tool is. Highly recommend people learn this tool in depth. redbluelabs.myspreadshop.ca/ 0:00-7:14 Foundational Usage 7:15-14:03 Hacker Themed Commands
How To Do GeoIP in Wireshark
Переглядів 1442 місяці тому
It's kind of interesting seeing where globally your network traffic is coming from. People can use this technique to see find out where people live. Use VPN! Merch: redbluelabs.myspreadshop.ca/
How to do Static Routes with PFSense
Переглядів 1,7 тис.3 місяці тому
In this video I am showing a homelab setup where a a pfsense machine is routing across a network to another pfsense machine. Make sure to check out the chapters if you are wanting to skip to the static routes portion. ua-cam.com/video/dFsjB03_9jQ/v-deo.html (setup pfsense in virtualbox) ua-cam.com/video/MXoiPrQBTwI/v-deo.html (setup host only network) redbluelabs.myspreadshop.ca/ 0:00-0:35 Intr...
Set Up Snort in PFSense From Scratch (IDS and IPS)
Переглядів 1,8 тис.3 місяці тому
Set Up Snort in PFSense From Scratch (IDS and IPS)
How To Connect To the Dark Web (Windows 11)
Переглядів 1,5 тис.4 місяці тому
How To Connect To the Dark Web (Windows 11)
Checking For Open Ports on the Internet NO SCANNING!
Переглядів 1704 місяці тому
Checking For Open Ports on the Internet NO SCANNING!
Learning Wireshark: Conversations (Land Attack and Scan Identification Demo)
Переглядів 1225 місяців тому
Learning Wireshark: Conversations (Land Attack and Scan Identification Demo)
How to Crack SSID Passwords in Wireshark
Переглядів 1,3 тис.5 місяців тому
How to Crack SSID Passwords in Wireshark
Learning Wireshark: Protocol Hierarchy
Переглядів 2275 місяців тому
Learning Wireshark: Protocol Hierarchy
Learning Wireshark: Endpoints Window
Переглядів 2586 місяців тому
Learning Wireshark: Endpoints Window
4 Ways to Hack Your College Education
Переглядів 8407 місяців тому
4 Ways to Hack Your College Education
Connect to Domain In Different Network (HomeLab)
Переглядів 3779 місяців тому
Connect to Domain In Different Network (HomeLab)
How To Connect Ubuntu to Windows Domain (HomeLab)
Переглядів 1,5 тис.9 місяців тому
How To Connect Ubuntu to Windows Domain (HomeLab)
How To Connect a Windows Machine To a Domain (Homelab)
Переглядів 6489 місяців тому
How To Connect a Windows Machine To a Domain (Homelab)
Setting Up Windows Server 2022 (Home Lab)
Переглядів 1,3 тис.9 місяців тому
Setting Up Windows Server 2022 (Home Lab)
No linky.
@@calgarymartin thx for letting me know! I will add one to the description and here! 12ft.io/
This is great! I love it.
goat
Thanks for watching:)
Great material
Thanks for watching:)
Bro I did exactly what you said in the tutorial but still no connection
Thanks for leaving a comment, it depends on your virtual lab set up a bit. NAT first then network second in your virtual box. Make sure that pfsense is in the same order. Quite often though the issue is actually on the host machine, that even when the firewall is correct the VM won't connect through. Double check your browser and network settings on the machine you are wanting to connect from. I hope this helps a bit :)
My host machine is a Chinese build from AliExpress firewall router j1900 Celeron cpu so bro could you share with me your pfsense configuration and exactly your host machine specs so maybe I could try to copy you exactly so it could work out and please be as detailed as possible cuz I'mma noob 😅 And please leave me your chat app number so we could talk a lot more cuz honestly I'm from Saudi Arabia and and our timezones are pretty different so please share with me your day schedule when you're free and when not
Thanks it worked for me. Now my opt network is able to access the internet. Now I know only the lan interface by default allows internet. Not the case with the other interfaces. Manually have to adjust rules to allow internet access for the rest of interfaces in pfsense. Thanks 🎉
I'm glad the video was helpful ! Thanks for watching:)
Bro I did exactly as you said in the tutorial but I still struggle to get any connection @@RedBlueLabs
Can you do it with more than just one file?
That is a great question. I personally have never done it with more than one. However this technique should work with a zip file. If you try a zip let me know how it goes !? Thx for watching :)
@@RedBlueLabs I tried it and it kinda works but not always. Thanks for anwsering my question
Wait, is it normal if my passwords are incorrect on a data breach? Is it because hackers are dumb, or is it suppsoad to show the wrong password😅
If you think that was a disappointing feeling....I just lost my streak today, because life got really busy with work, kids, school (CyberSec Bachelors), and I forgot yesterday.....310 days in....
@@user-lj8xm3nh2z oh man!! That would be frustrating. Are you going to try the streak again?
@@RedBlueLabs I might, just to say I did it. In 2 years when I'm done with school. But this time I'm probably going to bank the correct answers/flags. Maybe do a couple today, write them down in a txt file and just submit them 1 a day. Then I can keep my sanity and do a couple of hours, while still having fun and learning, without the drag of having to actually try every single day (Like I've done up 'till now). I just did what I could for 310 days 😂 On a really good day I might have had 30-something answers submitted (granted some of those where just read the text and click "done"). My next try is just going to be a cheese-fest.
Have a great break, can't wait for the next video!
Thanks dude learning this now
Awesome!
@@RedBlueLabs this motivated me to throughly enjoy learning as well, thanks for the video
I've just subscribed. I been looking for someone like you, for a long time. Nice and slow gets the job done, correctly. Looking forward to more content from you.
Thanks so much for the comment. :) What are some other areas of cyber that you enjoy watching on UA-cam? Some niche tech stuff that my channel could potentially do?
Enjoy your vacation, you are awesome!!! 🎉
Thumbs up for your vacation! 🎉
Enjoy your vacation!
Thanks!!
So don't use this for a business, but fine for a home router. Since you have to be on my network for this exploit to work.
Excellent point. Exploring exploits on old equipment is great for learning. Thanks for leaving a comment
Awesome bro❤
thanks for watching :)
i have an update problem can you help me please?
What is the error message?
Hi , I have done : pktmon filters remove (accidently) . Did this mess up my windows ? thank you ...
I truly don't think so. I believe you are fine :)
I believe you should be fine:)
@@RedBlueLabs Ok , I appreciate . Thank you
Its the same deal with floppy disks and cd rom drives
Hacker mindset: also pretty decent for doxing. If you just know their email, it gives you all their (breached) usernames to Google 🙃
Is the site safe?
it is, lots of people use it. it's in the same vein as "haveibeenpwned.com" it's really checking to see if your email is part of a data breach. the goal of the short was to show that if someone wanted they could check other people's emails and get like the first couple letters. Even having the first couple letters can help with social engineering of someone 's password. Be careful out there! thanks for watching :)
@@RedBlueLabs thank man! Really appreciated it! 😊😊
Eaglesd Ewwwwwww lo
I know I know, I'm fan. Thanks for watching despite the Eagles shirt :)
@@RedBlueLabs Dont worry I am a Giants fan lol
Love content like this!! Thanks!!!
thanks! I appreciate your comment :)
How would you go about sharing the lan network with VMs and physical hardware? My system has two physical Ethernet ports
This is a very good question. Without knowing more, it would depend how you are going to run PFSense. for me I am working on putting pfsense on a physical machine, where the only OS for the desktop is PFSense, this means though that I would have to use two physical adapters to actually use them as networks. I need to do a bit of digging to see if what you are wanting is possible. PFSense is a great option for a free router, that is why I am going to be making a dedicated desktop that is only PFSense. Sorry I couldn't be more help, thanks for watching the video :)
Dude--you rock.
Thanks!! Thanks for watching:)
Thanks Andrew, this was very helpful!
Thanks for watching!
thank you so much bro
Thanks for watching:)
Awesome video, as always!!!
Thanks for your comment :)
Great video.
Thanks for watching:)
Among the thousands of tutorials I've watched this one is the best one. thanks mate
Thanks! I appreciate that. Thanks for watching:)
So what a SSID can do?
The website is a collection of SSID from thousands of people collecting the data. It's interesting to check out your own area. Thanks for watching
Great Video! Thanks!!!!
I'm glad it helped!
Always had issues with GeoIP in the past but this is extremely helpful for new and current B/W/G hackers
The GUI for firewalld is a nightmare to try to explain to new Linux users. I've gotten lots of people to switch from Windows and several to Fedora specifically and the firewalld GUI presents them with something designed for high level IT networking professionals. I know Fedora is upstream to Red Hat so this makes sense. But to a Linux newbie running Fedora on a home desktop, it is terrible. I actually laugh out loud when I see the firewalld GUI referred to as simple or easy.
Valid points! I remember switching to linux full time and my learning curve back then was steep. In general having a firewall is important, firewalld is just another flavour. Thanks for watching
cant connect to a.htb
a.htb is just place holder. I set the ip and "a.htb" in /etc/hosts. when you "ping" a.htb your operating system looks to /etc/hosts to see if that name is associated with an IP. if it is associated your ping will work successfully. Similar process in this video but we are not pinging we are connecting to a machine with an FTP server running. Thanks for watching
I started learning Python in the MIMO app. after 60 days or so doing Python exercises and keeping my streak going, the lessons were too hard to do passively and actually required active focus/taking notes/real learning. Did I take the opportunity to proceed with Python training as I intended? No - i switched to intro level SQL and then entry level HTML to keep the streak going. This video is 1000% right, the longer you go, the more it becomes about the continuation of the streak and the less it becomes about actual learning.
Thanks so much for leaving a comment. I keep hearing people saying similar things. These tools are good, but there is definitely a temptation to farm low level challenges to get that streak, and then at the end of the day you have a streak, but what does it mean? Thanks for watching :)
Thanks
No problem!
can I change the address static after ??
For sure!!
Amazing video and helped me so much so thank you! I have one question, is it possible to filter to show the range of ports scanned, for example, if I had a file with a ton of ports scanned but I wanted to see the lowest port scanned and highest port scanned. Is that possible?
Thanks for watching, what you are talking about is possible! We can set port ranges with Wireshark filters tcp.port in {443 4430..4434} For example looks for TCP port that matches 443 and then a range of 4430 to 4434. I have been considering doing a video on this topic. I really like Wireshark. Thx for watching:)
Great thank you so much, I'd been trying to wrap my head around the documentation and was getting nowhere fast lol.
Thank u,dude.Your video actually helps me!
Thanks so much for watching! I'm glad it was able to help!
Love how much you experiment and show off neat stuff!
Thanks for watching, the way I learn is to try out the different things and see how it works. I hope these videos are helpful and enjoyable :)
Great video! Well-explained and very useful.
Thanks, I really appreciate that:)
Thank you so much for the tutorial! 💯
thanks for watching :)
great video😊
Thx for watching:)
why it is showing me 404
Sorry for my ignorance, but what do you mean attack? Can i get my neighbor's wifi password through that website?
No worries, it means that the IP has a vulnerability that is known and can be intentionally targeted. Wouldn't be your neighbor because a router would need to have the vulnerability, and not every router is weak in this way