Linux Security - UFW Complete Guide (Uncomplicated Firewall)
ฝัง
- เผยแพร่เมื่อ 27 ก.ค. 2024
- In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video will explain and demonstrate how to set up and configure UFW and various firewall rules.
Register for part 2 of the Linux Server Security Series: event.on24.com/eventRegistrat...
Get $100 in free credits on Linode: promo.linode.com/hackersploit...
Our videos are also available on the decentralized platform LBRY: lbry.tv/$/invite/@HackerSploi...
SUPPORT US:
Patreon: / hackersploit
Merchandise: teespring.com/en-GB/stores/ha...
SOCIAL NETWORKS:
Twitter: / hackersploit
LinkedIn: / 18713892
WHERE YOU CAN FIND US ONLINE:
HackerSploit - Cybersecurity Training Simplified: hackersploit.org/
HackerSploit Forum: forum.hackersploit.org
HackerSploit Academy: www.hackersploit.academy
LISTEN TO THE CYBERTALK PODCAST:
Spotify: open.spotify.com/show/6j0RhRi...
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#Linux#Security#Cybersecurity - วิทยาศาสตร์และเทคโนโลยี
Just noticed hackersploit is about to hit half a million subscribers
Already hit
Very crisp and to the point videos with nice explanation. Now onto the other 6 vids...
Timestamps:
0:00 Introduction to the series
2:14 Video starts
You can register for part 2 of this series here: event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&partnerref=website&eventid=2649692&sessionid=1&key=FDD7D40926383C11B3392509222D8368®Tag=1558905&sourcepage=register
Nothing you didn't know about - You've done a great job again.
How People Get Infected With Malicious Word Document[]:
th-cam.com/video/E-Xc_bQyG2c/w-d-xo.html
first nginx and now UFW !! this is amazing!
Lot of bad bot attacked on my vps, now I understand how to use ufw, thanks ❤
Thank you very much. This is amazing tutorial.
crystal clear Thumbs Up .. Great tutorial Thanks a ton dude
This is amazing series bro thank you so much for everything
@WORLD TIKTOK official i see you everywhere
very clear and to the point tutorial, thank you 🙏🏻
Excellent video! Liked and subbed 👍
🔥🔥🔥 for this 🔥wall guide, sir.
Thanks man!
I needed this :)
Nice and clear. Superb
Thanks for your videos and share your knowledge (from France)
Thank you very much for the support.
great stuff as always
Great video! Useful
very great video , many thanks
So Clear And Great Video Thank You So Much 💓
Great content!
You are the boss for firewall.
excellent. thank you. subed
Nice, funny enough that "useless" command was exactly what I was looking for haha
thank you so much sir.
Thanks for the content, I'm just so bored at university, I feel like im withering away! x)
What are you in uni for?
@@kellysmith7357 Cyber security
Excellent
thank you for your help
brilliant!!!!
More more more thanks bruhh
Please more of this
a "complete guide" would cover nat/ip masquerading feature of ufw too, and probably gufw as well
You are great
Please never stop posting vedios, sir💛
I'm sorry....
videos*
You look like “Walter”
In series "scorpion" 🔥
Another way to see if a package is installed is by using the which command "which ufw" if its installed the command will return the the path of the ufw command
Hi! I'd like your opinion on the platform INE Training, I don't know if it's worth it. Have you used it? Have you known anybody who has? They're quite expensive. Cheers mate!
I would switch to root user to do all this vs type sudo 1000 times. Complete insanity when doing firewall maintenance or a demo to not be logged in as root. Otherwise good solid tutorial.
Yes, using sudo is the root cause of inefficiency in firewall management :B
Great Video, is there anything built-in for geo-location deny...
@Hackersploit, thanks for all yr videos. I want to keep on going, but i get keeping output ( hash of expected file 17544910 weak) when i try to update kali linux or parrot os
if you get the 90 day thing on the 14th of december, will it still be 90 days?
Question. what if instead of IP we enter a DDOS domain that is linked to my IP and refreshes the IP as soon as it changes.
Hi, in this ufw can we create any rules like web content filtering, game sites blocking, chat box blocking, like that. Is it possible in this..
Sir please make video on covert channel analysis and data hiding in tcp/ip
hi, how about allowing from a certain mac address? i.e. just a device
I have a laptop with a fresh install of Debian. I installed ufw. I set it to deny all incoming and outgoing traffic by default. I even created rules to deny http and https. And yet, the laptop has access to any website i choose. Why?
Where can I get the precious videos for this playlist?
I need help please! Anyone who knows sqlmap.
Using mulltidae page and burp suite with sqlmap
I keep getting an error. Connection timed out and GET parameters page might not be injectable.
Please help!
question: How to attack private network with double NAT ?? I want to test how secure my network is, target is second router, how to punch trough the NAT ? In Ur videos most attacks are fired in LAN, and the target machine is in the same network with attacker. What about hacking trough WAN ?? Sorry for bad English
When I run the command ' ufw status ' as root, the only output I get is ' :active ' , nothing else is shown... no TO , ACTION of FROM?
how can i run my phishing over wan 24x7 so that it keeps on running even my pc is shutdown or i can access that from any where
back when i started using ufw it was more complicated than iptables for me
Better if you state what's possible fix if happened you restrict ssh only for your ip address and suddenly change. How can you access if that happen?
Does port forwarding require our public ip?
Can be possible bypass ufw ?
For example : if add ruled individual ip for port 22
Someone can be bypass for ssh login?
This might be a bad question but how can I get the "background" that you have with all the system info
Sure, here is the GitHub repository: github.com/aristocratos/bashtop
I have blocked connections to the http port with the command "sudo ufw deny http" but my web server is still accessible, why?
Why when i enabled a specific port, it stil does not work? What can be the reason?
Debian, both desktop or server DOES NOT come a firewall or WIFI by default. Instead it's you responsible to CHOOSE which of Deb packages offered will serve you best. In fact, Debian is capable to of being an Enterprise Networked server.
quick question, how do I configure nginx to add a "downloads" folder I can access with www.my-server.com/downloads?
Uncle help me become a hacker
plase make some video about ss7 attacks
@HackerSploit after You upload the video, do You save it also on your PC or external HDD/SSD in case TH-cam ban your profile?
BTW You are amazing bro!
What he does is legal, there's no "ban" that can be put on his videos
@@christiaan_saaiman I know man but TH-cam can change they policies any time and then ban him...
@@upup5133 but policies on...? This is regarded as educational content and as long as he's got a disclaimer, the whole "only for ethical reasons" thing going on, it should be fine
@@christiaan_saaiman I hope that everything will be fine cuz this man is amazing teacher
Up Up absolutely bro
is their any way to backup
Bro
I need your urgent help
I want to set rat on my brother phone it is very important he goes on betting sites which making him in debt
I know about rats an all
I create rat by 888 rat
Problem is static ip
I take static ip from no ip site
But it is only for some days after that account freezes
There is something important to know that can help in yhis case
When he return to home he connects to same wifi router
So using this can we put aside the internet and work only with lan
I give my pc custom ip and connects to my rat on device connected on same router
i deny http port but apache server is still accessible in ubuntu linux
How to instal UFW on mac?
UFW is not available for Mac. MacOS has its own firewall utility.
Seria muito útil diferencia o que ele escreveu pro que foi gerado a partir de código
It also worth to know that some services can write their own rules to tables and they will be bellow, that means that it will rewrite rules above
5:50 Comienzo
Hello Sir. How to hack any apk like Dream 11 it's live gaming apk like cricket and others. Please make Video on this contant 🙏🙏
iptable is depreciated, why using another software on top of iptable ???
Can anyone help me that from where should i start learning , i am new here🥺
th-cam.com/video/3Kq1MIfTWCE/w-d-xo.html
Is it possible to hack android 10 with metasploit? if no then how can we hack a device with android 10? please reply
If you have the simple setting as below your security is fine in ubuntu/linux
sudo ufw status verbose
Status: active
Logging: on (low)
Default: deny (incoming), allow (outgoing), disabled (routed)
Completely unnecessarily to open any door/port. It make s your system weak in my opinion.
Are you from Egypt
انت من مصر اخي
#RX
DORX.
except its now nftables
What is your source of knowledge
Uncle hacker, help me become a hacker
What the heck is all that [--dry-run] nonsense before every command? Purpose/use
of 'dry run' reference?
How to creat a bot net or a zombie machines
Not quite complete. Good start though.
Hey!
Wifi is not showing on my linux distro. Pls help😕
Ab ye karega hacker sploit?? Noobde
Thank you very much. This is amazing tutorial.