Motasem Hamdan is a Syrian-Lebanese content creator, instructor, swimmer and Entrepreneur who creates cyber security training videos and articles, provides marketing consultancy and writes research papers in healthcare cyber security. Check out my study notes motasem-notes.net/
do u need to press wps button 1st? physical access required? yes or no? and also is this a passive attack meaning do i need alpha usb or can i use my built in (no monitor mode or w.e) ? or do i need to be able to inject packets to use this method?
Small correction that I want to suggest: at 05:40 under Event Viewer Application = events related to installed programs (not system) System = events related to system components (not programs)
26:21 the question is now updated to what is the MD5 hash of the interesting file, you don't get the answer from the first result but when I try to paste in the second md5 hash I get an error. Some one else with the same problem ?
I have to say, I have watched numerous videos on this subject and this one is all over the place. It's good to see you left your mistakes in there, but it makes trying to follow along and learning very hard.
Brother, great video here today. Please do not stop. It is incredibly overwhelming transitioning form easily setting up and having data to work with to actually doing SOC analyst like work in real world like case scenarios. This is that first step that has showcased how direct and easy it is to navigate such data. Thanks for this video.
lol. These antiquated attacks wouldn't even work on the worst of secured networks in today's world. NONE of this would work against ANY NGFW on the market within the past decade.
You need to create one rule it says in the Hint. After trial and error, this rule works alert tcp any any <> any 80 (msg:"Web traffic genereeted" ; sid:1000002;)