Русские видео

Сейчас в тренде

Иностранные видео


Скачать с ютуб Networking for Hackers and Cybersecurity professionals (How long until you learn something new?) в хорошем качестве

Networking for Hackers and Cybersecurity professionals (How long until you learn something new?) 8 месяцев назад


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



Networking for Hackers and Cybersecurity professionals (How long until you learn something new?)

Let's play a game. How long does it take you to learn something new in this video? // YouTube VIDEOS mentioned // Decrypting TLS HTTP/2 and QUIC with Wireshark:    • Decrypting TLS, HTTP/2 and QUIC with ...   // YouTube PLAYLIST // Wireshark with Chris Greer:    • How TCP really works // Three-way han...   // David SOCIAL // Discord:   / discord   Twitter:   / davidbombal   Instagram:   / davidbombal   LinkedIn:   / davidbombal   Facebook:   / davidbombal.co   TikTok:   / davidbombal   YouTube:    / @davidbombal   // MY STUFF // https://www.amazon.com/shop/davidbombal // MENU // 00:00 - Introduction 00:28 - My Setup 00:43 - Do You Know? 01:26 - Start of Demonstration with Telnet 03:54 - Port Numbers Further Explained 04:55 - Using Apache2 06:29 - How Are Port Numbers Assigned? 08:39 - Ephemeral Ports 10:42 - Using Fing 11:34 - Restarting Apache2 and Denying TCP 15:54 - Which Port Numbers to Clients Actually Use? 17:46 - On Ubuntu 19:01 - Theory vs Reality 23:37 - Difference Between Port Number and Socket 26:07 - Demonstration Continued 29:04 - What You've Learned So Far 29:54 - One Last Demonstration 32:34 - Conclusion and Outro // Detailed MENU // 00:00:00 - Introduction to the Game - David introduces a game where viewers comment on the timestamp or topic where they learn something new. 00:00:11 - Importance of Port Numbers - Emphasis on understanding port numbers for those interested in cybersecurity, networking, or other fields. 00:00:24 - Network Setup - David describes the network setup involving Kali Linux, Cisco routers, a Windows computer, and mobile devices. 00:00:48- Understanding Ports and Sockets - Queries about the difference between port numbers and sockets, and their relevance in TCP/IP. 00:01:28 - Demonstration with PuTTY and Telnet - A practical demonstration using PuTTY and Telnet to connect to a specific port on a Cisco router. 00:03:04 - Character Generator Protocol (CHARGEN) Discussion - Explaining CHARGEN Protocol and its historical significance. 00:03:11 - Disabling TCP Small Services and Testing Connection Refusal - The process of disabling TCP small services on a router and testing the impact on connectivity. 00:04:01 - Kali Linux Server Setup and Apache Service Start - Setting up a server on Kali Linux and starting the Apache service. 00:05:09 - Analyzing Network Traffic with Wireshark - Using Wireshark to analyze traffic and understand port numbers in network communications. 00:06:39 - Understanding IANA Port Numbers and Ephemeral Ports - A look at IANA's list of port numbers and an explanation of ephemeral ports. 00:07:54 - FCs and Operating System Differences in Port Usage - Discussing RFCs and how different operating systems use various port ranges. 00:08:54 - Testing Port Accessibility with Mobile Devices - Using mobile devices to test the accessibility of ports on a network. 00:11:38 - Implementing Access Lists on Cisco Router - Creating and modifying access lists on a Cisco router to control network traffic. 00:14:06 - Difference Between Port Numbers and Sockets - Explaining the conceptual difference between port numbers and sockets. 00:16:00 - Demonstrating SSH Connections and Port Usage - Demonstrating SSH connections from different devices and analyzing the port usage. 00:18:03 - Blocking SSH Traffic with Access Lists - Blocking SSH traffic using access lists on a router and observing the effects. 00:21:37 - Discussion on DNS Protocol and Traffic Blocking - Discussion on DNS protocols and the impact of blocking DNS traffic with access lists. 00:27:41 - Exploring HTTPS and QUIC Protocols with Browser Examples - Exploring HTTPS and QUIC protocols using various web browsers and analyzing network traffic. 00:32:11 - Conclusion and Future Content Ideas - Concluding remarks and thoughts on future networking-related content. kali linux linux nmap ssl http https ssh telnet chargen port port numbers wireshark #kalilinux #cybersecurity #hacker

Comments