Short , Loud and Clear . < Learning alot from You, i was able to install pfsense in the company that i am currently working after i saw your pfsense tutorial > Thank you for your Blessed Efforts. Zeid Al-Seryani.
You really made this easy to understand. I see exactly how UFW works now. Thanks. I was learning about iptables, but seems like ufw can do same thing and seems easier to me.
Hey there bro Or actually lemme call you sir, It seems their are quite many Indian viewers also on Your channel cause you mentioned your ' thank you for watching' greeting in Hindi. That's our mother tongue. I just loved the way you greeted in different language. Anyway I am following your ETHICAL HACKING SERIES and learning a lot. We as students request you sir, please never stop creating such videos. Even make more similar and much more INFORMATIVE and ADVANCE videos in future. LOVE YOU SIR. And धन्यवाद for your informative videos. By the way धन्यवाद means Thank you in Hindi.
9:18 You forgot to mention that you can limit connections to ssh and any other inbound connection by replacing allow with limit. This rule stops brute force connections from a specific IP after six simultaneous connections within thirty seconds.
thanks i would like him to also teach the gui version graphical interface of ufw and the theory with graphical whould be more easy to map it remember the theory. pls for newbies.
Greetings, a query, my pc connects wlan to router and assigns me an ip for its dhcp 10.10.1.10 if I have everything configured by default in ufw and I apply the following command: ufw deny from 10.10.1.0/24 with this I block any access from the internal network to my computer so that I can avoid any attack, what else can I do in the configuration apart from denying the ping response. sorry my bad english
Hi Alexis. Quick question, off topic. Ive got kali 2019.1 installed and when I do apt search it shows Ive got metasploit v5 but when I go into msfconsole it shows as v4.16.58. Im all updated and upgraded, any ideas, would be a grate help
@HackerSploit You made a mistake when deleting rules 1 and 2. Since when you delete the first rule the second rule becomes rule 1, so you deleted 80/tcp instead.
Thanks, sir I see all video.i have an issue that I have 2 servers. for example server, A, and server B.i want to connect Mysql of server B from server A.But when I try to connect it gives me server time out from server A.Someone advice me to open port Of server B from server A firewall. That is what I am confused. could you please help to fix this issue. I appreciate your reply
I think yes but this will happen when you will try to login next time. Your current session is still active and you can still change the settings at that time.
Plz make a video on unlocking pattern lock without data loss not enabling USB debbuging or backup ...only using Kali Linux ....plz make a video on THIS if u can... because till now nobody made any real video on this...
Thanks for all your videos. I noticed in the description you listed russian second on that thank you roseta stone list, in the event youre Russian, do you know any good Russian websites for cyber security info or news? Thanks, спасибо
ONE IMPORTANT QUESTION.. HOW DANGEROUS IS TOR EXIT NODE ? CAN SOMEONE FIND THEY REAL IP ADDRESS TRACKING TOR EXIT NODE IF YES HOW WE CAN AVOID THAT ? THX
Short , Loud and Clear .
< Learning alot from You, i was able to install pfsense in the company that i am currently working after i saw your pfsense tutorial >
Thank you for your Blessed Efforts.
Zeid Al-Seryani.
You really made this easy to understand. I see exactly how UFW works now. Thanks. I was learning about iptables, but seems like ufw can do same thing and seems easier to me.
UFW is a wrapper for iptables
Merci bien grand prof. Tes videos sont vraiment interrescent.
Hey there bro Or actually lemme call you sir, It seems their are quite many Indian viewers also on Your channel cause you mentioned your ' thank you for watching' greeting in Hindi. That's our mother tongue. I just loved the way you greeted in different language. Anyway I am following your ETHICAL HACKING SERIES and learning a lot. We as students request you sir, please never stop creating such videos. Even make more similar and much more INFORMATIVE and ADVANCE videos in future. LOVE YOU SIR. And धन्यवाद for your informative videos. By the way धन्यवाद means Thank you in Hindi.
iptables next please!!
Yes!!
Hey Mr HackerSploit, Mahn... This is huge, i love it... Thanks again
Much love from share
Awsm explanation 🎈💫
Wow, i love it! Thank you very much! It was indeed pretty simple :D
Hi thank U for making these educational & informative ethical hacking videos. Keep up the good work.
This channel is awesome
I truly love this channel
You're doing such an awesome job dude!!
thank you sir just this what i need to know ! you doing great job
Thanks for this video, very nice explanation :) !
9:18 You forgot to mention that you can limit connections to ssh and any other inbound connection by replacing allow with limit. This rule stops brute force connections from a specific IP after six simultaneous connections within thirty seconds.
thanks i would like him to also teach the gui version graphical interface of ufw and the theory with graphical whould be more easy to map it remember the theory. pls for newbies.
Awesome. Thank a lot bro your doing an amazing job.
Thank you Top presentation now subscribed will be watching others.
well done / master of work
Excellent video, thank you.
18:35 you did set it to .1/24 but masks take subnets not adresses so ufw changed it automatically to the subnet adress of .0/24
Tq so much it helped me alot
Can you please continue with more setups and configurations of Pfsense?
@HackerSploit does the UFW accept bulk IP address from txt or csv file?if so, how?
Please Introduce Bug hunting Series.
If you are on a remote host make sure to allow ssh by running "sudo ufw allow ssh" so you don't lock yourself out of your server.
Cheers Mate.
Greetings, a query, my pc connects wlan to router and assigns me an ip for its dhcp 10.10.1.10 if I have everything configured by default in ufw and I apply the following command: ufw deny from 10.10.1.0/24 with this I block any access from the internal network to my computer so that I can avoid any attack, what else can I do in the configuration apart from denying the ping response. sorry my bad english
Starts at 2:30
Thank You!
Hi Alexis. Quick question, off topic. Ive got kali 2019.1 installed and when I do apt search it shows Ive got metasploit v5 but when I go into msfconsole it shows as v4.16.58. Im all updated and upgraded, any ideas, would be a grate help
@HackerSploit You made a mistake when deleting rules 1 and 2. Since when you delete the first rule the second rule becomes rule 1, so you deleted 80/tcp instead.
Are you seriously going to spread negativity and criticism on every HackerSploit video?
is there any soft or script to get all urls from dork.... line "intitle:index of" as input and 1000,2000 urls as output ?
Video about bug bounty programs!
“If it isn’t already self explanatory.” LOL
So nice
have you removed some videos from this tutorial, @Hackersploit ?
UFW great
13:29 did you just mention Shodan!?
Thanks, sir I see all video.i have an issue that I have 2 servers. for example server, A, and server B.i want to connect Mysql of server B from server A.But when I try to connect it gives me server time out from server A.Someone advice me to open port Of server B from server A firewall. That is what I am confused. could you please help to fix this issue.
I appreciate your reply
Could you do something like exploit makin? Like analysing software etc
What if I accidentally run 'sudo ufw deny ssh' on my remote server? Will I be locked out of my server forever? (If I have only ssh access)
I think yes but this will happen when you will try to login next time. Your current session is still active and you can still change the settings at that time.
i've wifi and i have many devices connected to it ,can i use ufw to prevent a device from access youtube for example?
You can do it with your router configuration
Plz make a video on unlocking pattern lock without data loss not enabling USB debbuging or backup ...only using Kali Linux ....plz make a video on THIS if u can... because till now nobody made any real video on this...
Helpful
How about logs plz
Thanks for all your videos. I noticed in the description you listed russian second on that thank you roseta stone list, in the event youre Russian, do you know any good Russian websites for cyber security info or news? Thanks, спасибо
your voice reminds me of mufti menk.. dont tell me you are him
I don't see reason why you're using sudo if you're logged in as root ?
Why did you run sudo as root? Seems redundant
ONE IMPORTANT QUESTION.. HOW DANGEROUS IS TOR EXIT NODE ? CAN SOMEONE FIND THEY REAL IP ADDRESS TRACKING TOR EXIT NODE IF YES HOW WE CAN AVOID THAT ? THX
Great
I am from India please make a series of nessus scanner
@Hackersploit Can u show us how to force the victim to connect to a fake login page when he connect to the wifi ?
Any one knows ?
what you mean "force the victim?"
I meant captive portal 😓
@@ooxoox176 ua-cam.com/video/HhQYneVRT1o/v-deo.html
IZLEDIM
plz teach iptables
pls teach ip
Why did you make so many bots for you channel? Few comments and 239k followers, such a shame
no no no