- 15
- 115 441
securityguideme
เข้าร่วมเมื่อ 6 ก.ย. 2021
Import Nessus reports to SysReptor via CLI
* How to upload Nessus reports from CLI, either to notes or as findings.
* Customize the findings
* Works the same way for other plugins, like OpenVAS
SysReptor documentation: docs.sysreptor.com/
Getting started with reptor: docs.sysreptor.com/cli/getting-started/
Configure reptor: docs.sysreptor.com/cli/configuration/
Nessus plugin: docs.sysreptor.com/cli/tools/nessus/
* Customize the findings
* Works the same way for other plugins, like OpenVAS
SysReptor documentation: docs.sysreptor.com/
Getting started with reptor: docs.sysreptor.com/cli/getting-started/
Configure reptor: docs.sysreptor.com/cli/configuration/
Nessus plugin: docs.sysreptor.com/cli/tools/nessus/
มุมมอง: 448
วีดีโอ
SysReptor Installation, Configuration, Updates | Getting started with SysReptor
มุมมอง 2Kปีที่แล้ว
How to install, setup and update SysReptor. Find the setup instructions: docs.sysreptor.com/setup/prerequisites/ Timestamps 0:00 Intro 0:10 Prerequisites 0:43 Installation via Script 1:25 Installation Insights 4:10 Webserver Setup 6:36 Configuration 8:30 Updates 9:47 Outro
Pentest Reporting Walkthrough with SysReptor | Playground Demo
มุมมอง 2.7Kปีที่แล้ว
This is a quick walk through the pentesting reporting software SysReptor to show how to do: * Reporting * Customization * Defining Finding Templates Drop you ideas at GitHub Discussions: github.com/Syslifters/sysreptor/discussions Try the playground via the SysReptor docs: docs.sysreptor.com/ GitHub: github.com/syslifters/sysreptor/ Installation: docs.sysreptor.com/setup/installation/ Timestamp...
Incidence Response Mistakes // Have an Incident Response Plan or Process
มุมมอง 2532 ปีที่แล้ว
Alexander Kolmann from Microsoft's Compromise Recovery team explains the most common incident response and compromise recovery mistakes. Find the full interview at th-cam.com/video/FKQqrjKfVZA/w-d-xo.html Subscribe to my newsletter at securityguide.me Follow me on Twitter: AronMolnar2 Connect with me at LinkedIn: www.linkedin.com/in/aron-molnar-37b466166/
Bug Bounty from Metallica // That's what Inti from Intigriti was rewarded
มุมมอง 3172 ปีที่แล้ว
In this video Inti De Ceukelaire told me what he received as bug bounty from Metallica. You find the other parts of the interview in the playlist: th-cam.com/play/PL6yJSGodFbdna_suLEO1NMOXw1r3nfxsb.html Subscribe to my newsletter at securityguide.me Follow me on Twitter: AronMolnar2 Connect with me at LinkedIn: www.linkedin.com/in/aron-molnar-37b466166/
How to start Bug Bounty Hunting // Inti De Ceukelaire from Intigriti on becoming a bug bounty hunter
มุมมอง 4652 ปีที่แล้ว
In this video I asked Inti De Ceukelaire from Intigriti how to take the first steps of bug bounty hunting. We also talked about Labs and CTFs and how to not become a "beg bounty" hunter. You find the other parts of the interview in the playlist: th-cam.com/play/PL6yJSGodFbdna_suLEO1NMOXw1r3nfxsb.html Subscribe to my newsletter at securityguide.me Follow me on Twitter: AronMolnar2 Co...
Getting rich with bug bounty hunting // Inti De Ceukelaire from Intigriti about earnings
มุมมอง 1.2K2 ปีที่แล้ว
In this video I asked Inti De Ceukelaire from Intigriti if it is possible to really get rich by bug bounty hunting. You find the other parts of the interview in the playlist: th-cam.com/play/PL6yJSGodFbdna_suLEO1NMOXw1r3nfxsb.html Subscribe to my newsletter at securityguide.me Follow me on Twitter: AronMolnar2 Connect with me at LinkedIn: www.linkedin.com/in/aron-molnar-37b466166/
Cleaning up hacked servers // Compromise Recovery at Microsoft by Alex Kolmann, Part 3/3
มุมมอง 1852 ปีที่แล้ว
This is the third part of my interview series with Alexander Kolmann from Microsoft's Compromise Recovery team. In this part of our interview Alex will tell us * how to clean up servers and clients after an attack * the funniest incident he had * why companies cannot prevent hacker attacks * and why security certifications and compliance alone will not help to protect your company If you have f...
How to get rid of hackers // Compromise Recovery at Microsoft by Alex Kolmann, Part 2/3
มุมมอง 2572 ปีที่แล้ว
This is the second part of my interview series with Alexander Kolmann from Microsoft's Compromise Recovery team. I talk with him about... * how Microsoft's Compromise Recovery team actually gets rid of attackers * why companies should not pay any ransom * how to minimize the impact of attacks * what they can do to detect attackers faster If you have further questions, please post them below. Fi...
How to recover from hacker attacks // Compromise Recovery at Microsoft by Alex Kolmann, Part 1/3
มุมมอง 9332 ปีที่แล้ว
In this video I had the honor to interview Alexander Kolmann from Microsoft's Compromise Recovery team. I talk with him about... * how his team helps other companies to recover from hacker attacks * the differences between Compromise Recovery and Incident Response * how those teams work together * and why planning is so important to get rid of attacks If you have further questions, please post ...
KeePassXC Advanced Usage // 8 features you might have not heard about
มุมมอง 69K2 ปีที่แล้ว
This video shows advanced features of the password manager KeePassXC. Aron Molnar shows you what else you can do with this free and open source password manager. Download KeePassXC from keepassxc.org/download/ The YubiKey I use: www.yubico.com/at/product/yubikey-5-nfc/ Subscribe to my newsletter at securityguide.me Timestamps: 0:00 Intro 0:10 Leaked and weak passwords 1:12 Multi Factor Authenti...
HTTP Request Smuggling Attack Explained // Untangling the HTTP Desync Attack
มุมมอง 15K3 ปีที่แล้ว
In this video, Aron Molnar untangles HTTP request smuggling aka HTTP desync attacks. The basic concept is first explained. The vulnerability is then exploited in a practical example of Portswigger's web security academy. Detect http smuggling attacks using Offensity: www.offensity.com/en/signup/#signup Portswigger Web Security Academy Lab ("Exploiting HTTP request smuggling to capture other use...
Using a password manager // What everybody should know about using KeePassXC
มุมมอง 18K3 ปีที่แล้ว
Using a password manager is the best thing you can do for your personal IT security. Download KeePassXC at keepassxc.org/download/ Other password manager mentioned in this video are: • LastPass (www.lastpass.com/de) • 1Password (1password.com/) • Strongbox (iOS/MacOS; strongboxsafe.com/) • KeePass (keepass.info/) • passbolt (recommended for teams; www.passbolt.com/) Sync your password manager e...
Why nobody will ever crack my password // How long it takes for a GPU to crack passwords
มุมมอง 4.4K3 ปีที่แล้ว
Password complexities and password lengths are often discussed by people. In this video, Aron Molnar explains why you should choose a complex and long password and why it will take longer to crack good passwords than the period between big bang and now. Find further insights and the illustrations under securityguide.me/issues/password-complexity-how-long-it-takes-to-crack-passwords Subscribe to...
How Hacking Works: Stealing Data from a Webshop
มุมมอง 5363 ปีที่แล้ว
How does hacking actually work? In this video, I show you a vulnerability that allows hackers to steal customer data from an online shop or to log in without knowing any credentials. This vulnerability is called SQL injection and is still found in many applications. If you do not want to miss any of my security content, sign up at securityguide.me/ Timestamps: 0:00 Intro 0:20 Trigger an error 1...
Great!!! The Synchronization TIP was awesome!!! thankyou!
thank you! didn't know a few things :)
Thank you for the video. Is there any KeePass compatible mobile password manager on ios and android that is compatible with a keepass database that is protected by yubikey, like shown in your other video?
great video, can you make keepassxc cli video too?
how does haveibeenpwnd feature works exactly? how does it compare your password to leaked database of havibeenpwnd? it needs to upload your password to haveibeenpwnd???
Good job! Thanks 😀
Let's say i just finish the pentest exam, and i have taken 50 screenshots. Can you explain how i am going to implement them in the report,and what i have to modify in the report ? Thank you.
You can just cooy/paste them to the markdown fields.
Very well explained, thank you. Maybe it is time to made a new 2024 version of KeePassXC.
Video extremely useful for me. Thank you!
Anybody know how to get KeypassXC to enter 2 numbers ( the position of which keeps changing each time you log in ) from 7 passcode numbers in between entering your username and password as most banking web sites like to use ?
Прекрасно! Благодарю!
Should I worry about typing my master pass into keepassxc in Windows, considering M$ keylogs everything anyway?
nice one, Greggie. Thanks
bro how are you even writing?
What is difference of clone and adding additional urls?
Hi is there a way to automate the uodating of password in multiple entries? Is there also a way to change passwords for multiple entries at once? Thank you
Since it doesn't have a direct correspondent for Android, I'll stick with the oldest Keepass manager!😢
Not even KeepassDX?
@@stefanalecu9532it provides basic functionality but not as much as the full fledged version.
@@stefanalecu9532 KeypassDX works fine.
How do I ensure that when Windows starts it doesn't ask me for the database password? On iOS it is possible but on Windows I can't find how
Very good video. !! You deserve another sub
Thank you! Your video was really helpful.
ich habe mir mal das mit dem "Anhang" genauer angeschaut. Es funktioniert so wie du es erklärt hast aber es hat einen großen hacken! jedes mal wenn du die datei öffnest zb. word dokument wird eine kopie lokal im temp abgelegt. wenn du sie zumachst wird diese datei auch brav gelöscht. soweit so gut. wenn die datei aber offen bleibt und zwischendurch keepassXC in lock mode geht, dann bleibt die datei für immer im TEMP verzeichniss liegen. beim nächsten öffnen wird wieder eine kopie unter neuem namen abgelegt. BEi word/excel dateien mit heicklem inhalt ist das fast schon eine sicherheitslücke
Gratuliere. Am besten dem Projekt melden: github.com/keepassxreboot/keepassxc/security
@@securityguideme mal sehen ob ich es mir antun will. hab leider noch zwei drei andere recht dicke security probleme gefunden...die sagen wir es mal so...zumindest diskusionswürdig wären. Auch wenn ich keepassXC selber gerne nutze und das mein favorit ist, wirft das doch ein bischen ein mulmiges gefühl auf ob sonst noch sicherheitslücken gibt die noch schwerwiegender sind.
@@securityguideme hi, ich hab das problem bei github gemeldet....es wurde als drastisch genug empfunden das es wohl in 2.8 gefixt wird!
When I try to adjust the size of logos in the css and html, the code is ignored. Any recommendations on how to proceed?
You find the design documentation at docs.sysreptor.com/designer/designer/ If you're stuck, you can submit a ticket at github.com/Syslifters/sysreptor/issues and include more details and code snippets.
didn't ever think passkeyxc has so many additional feature! thank you
Been using KeepassXC for almost a decade, Learned more in 10 minutes, than in 10yrs ! 😄
Amazing video and very easy to follow and understand, thanks a lot!
It be great if you can make a video showing how to setup multi yubico keys
Good work!
Wonderful video. That sharing functionality is not as bad or difficult as I thought it might end up being. I wonder how that synchronization function actually works though. Sounds almost magical to me.
16+ uniformly random characters from the largest possible pool (uppercase, lowercase, digits, and symbols), unique for each site, stored in a password manager, protected using a double blind 16+ uniformly random characters password (preferably more characters), composed of something you have (such as a hardware token) and something you know, preferably stored on a standalone device (though this presents a potential problem in terms of redundancy), where the device is protected by biometrics and/or a really secure password/pin and/or hardware token. Isn’t security fun? Lol😆
Big Thanks! Great video - herzlichen Dank! The OTP feature and the Putty integration are amazing. Using yubikey would only make sense for me if one could register more than one yubikey for unlocking - I will try that out... Subscribed...
Fantastic video. I just installed KeepassXC after using the original one for years. I cant believe all those features you touched upon in the video. I haven't seen a better video on KeepassXC. I'm even able to use KeepassDX on my Chromebook and have a usable password manager now that's not tied to the cloud. Many Thanks
Thank you so much for such useful manual!
Great video, that attachment feature is the thing I was searching for. Thank you for such a useful content!
Great video! But it is possible to set mutiple users options and control acces with permissions?
Good content brother
SMS 2FA sucks, it's really nice that KeePassXC offers an alternative to this.
Now I got it, great explanation!
I have considered buying a Yubi Key off and on in recent months. I have heard that you have to log into the internet to register the key. I suppose this makes sense, but it that's true, what is it more secure than just using keepassxc offline? I'm just trying to understand.
I keep my KeePass database on Amazon S3, whilst using a master keyfile stored locally on my desktop PC and laptop - ie. AWS handles the syncing. Unfortunately, it requires the KeePass plugin KeeAnywhere to provide my AWS credentials. KeePassXC does not seem to offer this capability, so I have remained using the "standard" KeePass. It is the portable version so I just copy the KeePass folder from desktop PC -> laptop
SSH intergration with Remmina thanks to this tutorial. Excellent stuff thanks !
Thank you! Getting TOTP codes in Keepass is for me one of the most exciting things. I don't like to get the code on mobile device, I use it rarely and I don't have internet on mobile phone most of the time. Another great thing is adding and removing key from SSH agent. If works great with Bitvise SSH Client.
Isn't it dangerous to check if the passwords were leaked?
i wonder this as well
Generally not as the encryption standards used when checking are very high and if anyone really wanted to target you, they would have found another method
Awesome explanation and demo
Brilliant! I knew the math of the probability calculations, but seeing the time/cost escalation from 8 to 10 characters was very impactful and persuasive.
How can I use backup key ? It seems this program allows only one key
I love you, thanks a lot ❤❤❤
Great video. Thank you for the upload.
I already use a password manager called Keepass is this program associated with it ?
Hello all is there a way change shortcut in KeePassXC Copy Username Ctrl +B to something else? (Ctrl +C copy Password. Thanks
Thanks for the great tips. Recommend making smaller or eliminate the self view video frame at lower right corner while presenting.