In all of my backend servers, no matter what type of project, I implemented my rate limiter system in a way that it redirects any suspicious requests and/or brute force attacks to Never Gonna Give You Up music video on KZbin
@thatoselepe3888 сағат бұрын
I've been looking for this kind of KZbin channel for a while now. Glad I found and thank you for the lesson
@asassdsdd20 сағат бұрын
You have a very good video format. Easy to understand.
@shashi_galСағат бұрын
Amazing video. I learned a lot. Thank you so much and please keep the content coming.
@FRIDEI9 сағат бұрын
Love this, just waste their time and make fun of them like always! 🤣
@rnts086 сағат бұрын
One could just hold the connections, and reverse flood brute force attempts. Back when amplification attacks were more effective one could also use automated responses to rate limiting triggers. In theory.
@adissonbuchanan17313 сағат бұрын
Wow your channel is quite impressive even content aside. Already almost 1000 subs including me and it’s only been a couple months. You explained very well and I’ll be implementing this very soon! Looking forward to more security tips
@GnarCoding3 сағат бұрын
@@adissonbuchanan1731 thank you!
@CedroCron14 сағат бұрын
My father in-law had all sorts of issues with his VOIP having issues, I got rid of his off the shelf Netgear router and replaced it with a better Open Source firewall with more horsepower that can drop a lot of requests a lot faster than the slow junk sold on the shelf like his Netgear. Nothing but smooth VOIP calls now because the router isn't getting bogged down with so many scan packets it can't deal with.
@gamehacks581410 сағат бұрын
This is exactly how I list my skills on LinkedIn. You could have just said you bought a new router for your gramps 😭
@ChichaGad10 сағат бұрын
@@gamehacks5814 lmfaaaaao!! 🤣🤣
@gavinex8 сағат бұрын
@@gamehacks5814 damn
@CedroCron4 сағат бұрын
@@gamehacks5814 I didn't want to say what brand of firewall software I was using because it starts a flame war. So no it wasn't making it sound like I was overselling myself on a resume or linked-in.
@epicwolf36833 сағат бұрын
I found a youtube goldmine. This channel better blow up xD
@marfcast1012 күн бұрын
Awesome stuff!
@Rjcastillo13Күн бұрын
Nice video, you got a new sub!
@lStaline5 сағат бұрын
lets say the attacker has a vm that allows modifying ip header he can just spoof the source ip what can we do against that?
@GnarCoding4 сағат бұрын
@lStaline If someone spoofs their IP address in the packet header, any response to that packet would be sent to the spoofed IP address, not the attacker’s actual IP address. This is because the spoofed IP is what the server believes is the source of the request. You can think of it like the mail system You can put whatever address you want in the From section, but the reciever will just respond to that From address
@DailymemespoidyКүн бұрын
Can you make a video about how to evade these firewals and how to conduct a stealth penetration test with advance enumuration. really like this video and very easy to understand Im grateful good luck🔥