Great content sir
Beautiful
Fantastic video Sir, thanks alot! Could you show us simulation of an advanced threat? Very curious to see what a complex attack/detection scenario looks like.
Nice demo sir. Show us how security onion 2.2.0-rc3 works? Thanks mate!
thanks & useful
Thanks for such a good video but can you arrange them part wise it will be good to get clear understanding and keep doing good stuff bro
Noted Javed, please also check my playlists, the next video is coming as a series.
Thank you so much for all. What is the procedure to do penetration tests of an API secured by OAuth the latest version in the security side. (Laravel, Spring boot, Nodejs...).
Hey, you can actually also target FTP with wireshark... FTPS issue is it is in plain text same as telnet there's no encryption mechanism so if you're on a network ie you have been hired to break into a server and someone logs into there FTP you can filter wireshark to get the login information. If it's running something like VSFTP (Very secure FTP) there are CVES ie VSFTP 2.3.4 is vulnerable... Brute forcing is last result as they can have easy mechanisms to stop the login ie fail2ban or something.
How you configure email alerting for specific type of event? thanks for the video
Snort doesn't have an email capability itself, instead what people do is sending alerts to a log file and using a log parsing utility to extract various alerts and send an email.
Please do more videos on Security Onion, Rules Creations, Attacks and Defense.