Is this the beginning of a new type of firewall that will replace or augment traditional firewalls? Is AI now eating firewalls; and will we still be using them in future?
Big thank you to Cisco for sponsoring this video and my trip to McLaren.
// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU // 00:00 - Intro 00:27 - CiscoHypershield teaser demo 00:54 - Jeetu Patel // The development in tech 02:03 - Attackers using AI 02:46 - Tom Gillis // Are firewalls dead? 03:51 - Building blocks 05:14 - Craig Connors // eBPF explained 06:40 - Building blocks continued 09:07 - Trusting autonomous systems 10:41 - Cisco Hypershield announced // How A.I. will help against vulnerabilities 16:55 - How eBPF works 20:25 - Dual Data Plane explained 23:38 - How A.I. is changing the world 25:37 - A.I. is getting scary 26:24 - The future for the youth and A.I. 26:59 - Will A.I. take jobs away and can we trust it? 30:45 - Advice for the future 31:50 - Hack and Cisco Hypershield full demo 37:19 - Conclusion
ai ebpf linux dpu gpu cisco nvidia cisco firewall cybersecurity networking artificial intelligence cyber a.i. firewall ai firewall information security ransomware hack hacker hacking offensive security pentester ssl ca kali linux ethical hacker penetration testing chatgpt cisco ai bard chatgtp chat gtp Gemini google gemini chatgpt hack terminator ai robots machine learning cyber cyber ai ai cybersecurity iphone apple mclaren f1 formula 1 race
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
It's now easy to run Python for free using your iPhone or iPad. There is no reason to pay for apps if you want to study and learn Python.
// Menu //
00:00 - In this video!
00:35 - The Bad Apps
01:00 - Python3IDE
01:54 - Pyto
02:04 - Python Programming Interface
02:24 - The Good Apps//Carnets
02:39 - Jupyter Notebooks Advantages
02:48 - Running Code in Carnets
03:16 - Interactive IDE
03:40 - While Loop
04:35 - Code//Taking User Input
05:03 - Multiple Files
05:14 - Support for Popular Packages
05:36 - aShell
05:54 - Supports Linux Commands
06:03 - Config//Change Font Size
06:20 - Running Vim
06:47 - Running Python Scritp
07:13 - iPython//Running Code
07:37 - Thanks for the apps, Nicolas!
07:47 - Source on Github
07:54 - aShell//Other Features
08:11 - ISH
08:28 - Installing Python
08:38 - Updating References
09:01 - Basically Alpine Linux
09:28 - ISH & iPython
09:37 - Installing Nano
10:22 - Which Python App to Get?
11:08 - Don't Pay for Python Apps!
11:18 - Comment!//Which App Do You Use?
11:42 - If You Enjoyed This Video
// Download links //
Carnets: https://apps.apple.com/us/app/carnets-jupyter/id1450994949
a-Shell: https://apps.apple.com/us/app/a-shell/id1473805438
iSH Shell: https://apps.apple.com/us/app/ish-shell/id1436902243
// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
apple
ios
iphone
ipad
python
python ios
python iphone
python ipad
linux
Linux Phone
Linux iPhone
Python iPhone
ish shell
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#iphone #linux #python
...
https://www.youtube.com/watch?v=PJKcw7tx2DU
Cisco have released Cisco Modeling Labs - Personal (CML-P) today. In this video I show you how to get CML running on a Windows 10 computer and create Cisco topologies.
I'll cover all the steps in this video:
1) How to download CML
2) How to download and install VMware Player (free hypervisor software)
3) How to import CML and properly configure VMware Player settings
4) How to configure CML initial settings such as usernames and IP addresses
5) How to access the CML server using the CLI and Web UI
6) How to license the CML server
7) How to build a Cisco topology consisting of Cisco routers and switches
This is a full demonstration showing you how to get CML working on your computer.
Cisco CML-P (VIRL 2) is here: Learn how to download, install and configure Cisco CML-P (VIRL 2) using VMware Player and Windows 10. The new version of Cisco VIRL allows you to create virtual Cisco networks using just your Web browser. You don't have to use a thick client or any other software - everything is included and everything is easy to use.
The new version of Cisco VIRL 2 is one of your best options for CCNA, CCNP and CCIE Labs. VIRL 2 has multiple advantages over other platforms such as GNS3 or EVE-NG. VIRL 2 supports an HTML5 web client and contains all the Cisco IOS images. You don't have to use a thick client like you do with GNS3. You don't have to follow a convoluted process to get Cisco images working like you do with EVE-NG.
You don't have to try to find images as they are all included as part of your VIRL subscription and by simply mapping an ISO drive to your virtual machine you can immediately start using all Cisco IOS images in your topologies. Both EVE-NG and GNS3 require that you provide your own IOS images - typically they recommend that you buy a VIRL subscription anyway. That means that you are already paying for VIRL.
VIRL2 is also an official Cisco product - that means that you don't have to worry about any gray legal issues with regards to running Cisco IOS images on your laptop. This is an official Cisco product that is supported by Cisco. By paying your yearly subscription fee of $199, you can use Cisco IOS images such as IOSv, IOSvL2, ASAv, NX-OSv and others without any worries. VIRL 2 has everything you need to get started.
Disadvantages include the requirement to license your installation. That however has been simplified dramatically from previous releases. There is also a 20 node limited in topologies. However, for most of us that is fine for a lot of labs.
Is VIRL better than GNS3 or EVE-NG? In many ways it is. But, all platforms have advantages and disadvantages. If you are studying for your ccie, you many prefer gns3 or eve-ng as they don't limit the number of devices in a topology like virl does. VIRL-PE limits you to 20 d
...
https://www.youtube.com/watch?v=H1N1x9kt-pY
This is one of multiple GNS3 labs videos. In this video we configure PPP One-Way PAP authentication and PPP Multilink using CHAP authentication.
===========================================
Tasks:
===========================================
1) Enable PPP between R1 and R2
2) Enable one-way PPP PAP authentication between R1 and R3 (R1 = server, R3 = client)
3) Enable PPP Multilink between R1 and R4
4) View debug commands to view the PPP negotiation
5) Use debugs and show commands to prove that PPP Multilink has negotiated successfully.
6) Use Wireshark to view to the Multilink negotiation.
===========================================
IOS used: c3725-adventerprisek9-mz.124-15.T14.bin
===========================================
Get $200 worth of network software for free here: https://goo.gl/613TUF
===========================================
GNS3 Topology:
===========================================
https://goo.gl/NMKouJ
===========================================
Resources:
===========================================
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10313-config-pap.html
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647-understanding-ppp-chap.html
...
https://www.youtube.com/watch?v=o2zyjNUE1bI
Packet Tracer file (PT Version 7.1): https://bit.ly/2HjDQ9x
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
#CCNA #PacketTracer #CCENT
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses that are specified for that port. Alternatively, you can use port security to filter traffic that is destined to or received from a specific host that is based on the host MAC address.
Port Security with Dynamically Learned and Static MAC Addresses:
You can use port security with dynamically learned and static MAC addresses to restrict a port's ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. When you assign secure MAC addresses to a secure port, the port does not forward ingress traffic that has source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the device attached to that port has the full bandwidth of the port.
A security violation occurs in either of these situations:
•When the maximum number of secure MAC addresses is reached on a secure port and the source MAC address of the ingress traffic is different from any of the identified secure MAC addresses, port security applies the configured violation mode.
•If traffic with a secure MAC address that is configured or learned on one secure port attempts to access another secure port in the same VLAN, applies the configured violation mode.
After you have set the maximum number of secure MAC addresses on a port, port security includes the secure addresses in the address table in one of these ways:
•You can statically configure all secure MAC addresses by using the switchport port-security mac-address mac_address interface configuration command.
•You can allow the port to dynamically configure secure MAC addresses with the MAC addresses of connected devices.
•You can statically configure a number of addresses and allow the rest to be dynamically configured.
If the port has a link-down condition, all dynamically learned addresses are removed.
Following bootup, a reload, or a link-down condition, port security does not populate the address table with dynamically learned MAC addresses until the port receives ingress traffic.
A security violation occurs if the maximum nu
...
https://www.youtube.com/watch?v=ypW0KoM0DYQ
VPIM Part 1
Visit http://configureterminal.com/vpim-part-1-video/
The following topics are covered in this VPIM video:
* VPIM Overview
* Practical demonstration of sending a message
- On same system using telephone number
- On same system using dial by name
* Overview VPIM between two Unity Express Systems
* Detailed explanation of VPIM
- SMTP transport
- Port numbers
- Voice mail, vCard and spoken name
...
https://www.youtube.com/watch?v=N3lVEvbwKiw
This is one of multiple GNS3 labs videos. This video shows you have to configure PPP and PPP PAP. The next videos shows PPP CHAP and then PPP Multilink.
#CCNA #CCENT #CCNP
===========================================
Tasks:
===========================================
1) Enable PPP between R1 and R2
2) Enable two-way PPP PAP authentication between R1 and R3 (R1 password = cisco1, R3 password = cisco3)
3) View debug commands to view the PPP negotiation
4) View debug commands to view only the authentication process
5) Use show commands to prove the PPP PAP has successfully negotiated
6) Enable two-way PPP CHAP authentication between R1 and R4 using a password of cisco
7) View debug commands to view the PPP negotiation
8) View debug commands to view only the authentication process
9) Use show commands to prove the PPP CHAP has successfully negotiated
10) Use Wireshark to view to the PAP and CHAP negotiation
- What options does LCP negotiate?
- Does PAP use clear text authentication? Can you prove it?
- Which hashing algorithm used by CHAP?
- Does CHAP hash passwords?
- Can you see the IPCP NCP negotiation?
11) Enable EIGRP in AS 100 and prove that all devices can ping each other.
===========================================
IOS used: c3725-adventerprisek9-mz.124-15.T14.bin
===========================================
Get $200 worth of network software for free here: https://goo.gl/613TUF
===========================================
GNS3 Topology:
===========================================
https://goo.gl/nrKXzq
===========================================
Resources:
===========================================
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10313-config-pap.html
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647-understanding-ppp-chap.html
...
https://www.youtube.com/watch?v=TT9oG4UrJXI
Packet Tracer file: https://goo.gl/UJNSDT
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
#CCNA #PacketTracer #CCENT
This one of multiple NAT & PAT labs, Can you complete this CCNA Exam Lab?
Labs! Labs! And more Labs! Get the hands on experience to pass your CCNA exam!
This is a static NAT lab. Were you able to configure the network with static NAT?
Learn how DNS works, how NAT works and much more. How to NAT protocols like HTTP and FTP? Learn in this course.
Make sure you are ready to pass the CCNA exam! Prepare practically for the Cisco CCNA certification which is the most in-demand networking certification in the world today! Make sure you can pass the Cisco CCNA Routing and Switch 200-125 exam!
This course tests your knowledge of CCNA topics with practical, hands on labs. Labs include both configuration as well as troubleshooting labs.
Ask yourself these questions:
- Are you ready and prepared for the labs in the CCNA exam?
- Are you able to troubleshoot Cisco networks?
- Are you confident with your ability to configure networks as required by Cisco to pass the CCNA?
Answer:
This course helps you prepare for the exam and gain the confidence to pass the exam!
There are many topologies and many labs in this course!
...
https://www.youtube.com/watch?v=-6WCUMdvGlY
Rana's SSRF Udemy Course: https://www.udemy.com/course/mastering-server-side-request-forgery-ssrf-vulnerabilities/?referralCode=543CC218F2AE15D8B3C5
Free Web Hacking Course: https://www.youtube.com/c/RanaKhalil101
50% OFF Web Security Academy Course Code: DavidBombal500FF
Academy: https://academy.ranakhalil.com/
Free SSRF playlist: https://www.youtube.com/watch?v=ih5R_c16bKc&list=PLuyTk2_mYISIlDtWBIqmgJgn6CYlzHVsQ
8 hour SQL Injection playlist: https://www.youtube.com/watch?v=1nJgupaUPEQ&list=PLuyTk2_mYISLaZC4fVqDuW_hOk0dd5rlf
// Youtube videos mentioned //
SQL Injection Hacking Tutorial (Beginner to Advanced): https://youtu.be/yusJWttsD5o
The best Hacking Courses & Certs (not all these)? Your roadmap to Pentester Success: https://youtu.be/Zfz3ZN2dTDM
Free Web Hacking Course: https://youtu.be/WqbrB12Jvgc
// Rana’s SOCIAL //
Youtube: https://www.youtube.com/@RanaKhalil101
LinkedIn: https://ca.linkedin.com/in/ranakhalil1
Rana Khalil’s Academy: https://ranakhalil.teachable.com/
Twitter: https://twitter.com/rana__khalil
Medium Blog: https://ranakhalil101.medium.com
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X / Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
02:23 - Intro
05:37 - What is SSRF?
06:32 - Examples of SSRF
07:16 - Internal network
09:27 - About the course
13:11 - Common SSRF exploits
14:42 - Trust relationship
16:55 - Capital One cyber incident
19:01 - Defining SSRF
20:30 - First lab
23:30 - URL decode
27:13 - Second lab
28:53 - Port scan
32:52 - Third lab
33:29 - Blind SSRF attack
34:48 - Collaborator Everywhere Extension
37:34 - SSRF attack
38:18 - Shellshock payload
43:34 - Application layer defences
47:43 - Network layer defences
49:25 - Outro
ssrf
web
web hacking
web hacking course
web hacking tutorial
xss
owasp
owasp top 10
broken access control
http
https
website
web hacking full course
web hacking pro tips
web hacking book
xss
cross site scripting
portswigger
ajax
jscript
javascript
xss attack
xss video tutorial
xss attack tutorial
xss explained
xss attack example
xss bug bounty
kali linux
penetration testing
ethical hacking
bug bounty
cross site scripting
cross-site scripting
red teaming
cyber security
kali linux install
kali linux 2022
ethical hacker course
ethical hacker
javascript
ajax
jquery
node js
node js hacking
portswigger
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacker #hack #cybersecurity
...
https://www.youtube.com/watch?v=XUhquccrK0w