i'm about to start a master degree in cybersecurity and wanted to learn something by my own before the course... and bro yours is amazing. Love the way u teach and how u dont speed-up things, very well done job and thx for everything im gonna learn.
@@Beyondlimits_400if you find it shitty literally stop watching and choose among the other 1000s of free python courses at your level lol. You think he can make a single course for literally where every single person is at? Hilarious entitlement lol.
@@gitgudsec got to see after commenting though part 2 which has dos blocker it's only showing monitoring traffic but not the blocked ip as packet flood works fine and I did change target ip and network as mentioned ,it's not showing any blocked ip
@@khanaleena1161 3 things to check for: 1. Run iptables on firewall VM to ensure other IP is not being blocked 2. Run ping between the two VMs to ensure they are actually on the same VLAN and can communicate (or run arp -a etc) Then, if they are communicating it could be that your network is rate-limiting packets, to diagnose this please check line 21 on the firewall script: you can see that I commented out this line, just remove the # so the line is active. Run it again, and now when it receives packets it will display the rate threshold, if it is under 40 simply adjust your threshold value up top. Hope this makes sense, let me know if you got it to work.
sorry if it was unclear, but this will only work on linux as it's basically a wrapper for iptables, which is the linux firewall. so retry on linux, and if you don't use that yet encourage you to get started - you can download virtualbox (its free), ubuntu iso (free), and there are 100s of guides on youtube (also free). windows does not allow you to interact and customize components to degree of linux, so it represents greater learning opportunities.
i'm about to start a master degree in cybersecurity and wanted to learn something by my own before the course... and bro yours is amazing. Love the way u teach and how u dont speed-up things, very well done job and thx for everything im gonna learn.
You've shed a brighter light on the concept which create a ray of ......
FIRE, first time understanding someone's script after some time of self studying python and automation!
This is really cool man i appreciate this project this is perfect for beginners
thanks amigo, appreciate that
Love the content bro, new subscriber!
This tutorial goes by so quickly. Was this under the assumption that someone already knows basic coding?
Yeah he should really take out the beginners from the title. He just sped by this as if you already know how to build a script in Python.
@@Beyondlimits_400yeah i know its ridiculous! we should all demand a refund!!
@@theuxofai3907 Yes it’s free lol, with that my point is that it’s a bit of a shitty course if it’s aimed at people who have never coded.
@@Beyondlimits_400if you find it shitty literally stop watching and choose among the other 1000s of free python courses at your level lol. You think he can make a single course for literally where every single person is at? Hilarious entitlement lol.
@@Beyondlimits_400this is extremely simple btw, if you are looking for an INTRODUCTORY course, just look for that.
Hi, I want to try this project on my own. Is the random module a library or some other kind of file that I need to download before I attempt?
Great video
just wow
👏
Could you please not add the music in the background its abit difficult to focus on what you speaking. great series !!
This is so awesome. This is the stuff I’d love to do in cyber security or cloud.
I've coded this program in VS Code but I'm not able to run the program. Which extensions should i use if there are any ?
are you running it on windows or linux?
In python extrnsion
im having the same problem and im running it on mac os
@@riserisex2 hey, this will only work on linux, sorry if that was unclear.
@@gitgudsec ok thank you for answering i appreciate it
Cool!
Does this automate the job of microsoft Defender?
hey, no not quite. Defender is AV/EDR for the Windows OS. this acts as a wrapper for iptables, which is a FW for Linux.
Thank you man
thanks for the comment. literally my pleasure x
thank you dude
I make a pyton cyberscururty
Can i follow up if I am on Windows 11
Yes, install WSL2 or download virtualbox and run a Linux VM - all free
whre is this code
You can find the link right at the top of the description.
@@gitgudsec got to see after commenting though part 2 which has dos blocker it's only showing monitoring traffic but not the blocked ip as packet flood works fine and I did change target ip and network as mentioned ,it's not showing any blocked ip
And I am using 2 vms for this one doesn't capture the blocked ip though other one is flooding packets to that targeted ip
?
@@khanaleena1161 3 things to check for:
1. Run iptables on firewall VM to ensure other IP is not being blocked
2. Run ping between the two VMs to ensure they are actually on the same VLAN and can communicate (or run arp -a etc)
Then, if they are communicating it could be that your network is rate-limiting packets, to diagnose this please check line 21 on the firewall script: you can see that I commented out this line, just remove the # so the line is active. Run it again, and now when it receives packets it will display the rate threshold, if it is under 40 simply adjust your threshold value up top.
Hope this makes sense, let me know if you got it to work.
That it? This is just a simulation.. wheres the actual blocking? Wheres the package monitoring?
Hi, as mentioned in the end of the video this is done in videos parts 2 and 3.
@faanross I am running it on windows
sorry if it was unclear, but this will only work on linux as it's basically a wrapper for iptables, which is the linux firewall. so retry on linux, and if you don't use that yet encourage you to get started - you can download virtualbox (its free), ubuntu iso (free), and there are 100s of guides on youtube (also free). windows does not allow you to interact and customize components to degree of linux, so it represents greater learning opportunities.