Can Palo Alto Firewalls Really Prevent SQL Injection Attacks? | PART 9

  Рет қаралды 7,442

Keith Barker - The OG of IT

Keith Barker - The OG of IT

Күн бұрын

Пікірлер: 14
@kenmurphy4259
@kenmurphy4259 Жыл бұрын
Thanks Keith, great series on the palo
@KeithBarker
@KeithBarker Жыл бұрын
Thank you Ken Murphy!
@ericktapia775
@ericktapia775 Жыл бұрын
Thanks, Keith!! following you a couple of months ago.
@KeithBarker
@KeithBarker Жыл бұрын
Thank you Erick Tapia!
@manindersinghnegi3989
@manindersinghnegi3989 Жыл бұрын
Thanks a lot for sharing such a Very informative Video, Could you please let me know SSL decryption is really necessary to configure before using vulnerability protection security profile.
@lucasnyeinchan399
@lucasnyeinchan399 Жыл бұрын
well prepared video and thanks for sharing , i've been watching your pcnse video on cbt nuggets also
@KeithBarker
@KeithBarker Жыл бұрын
Thank you Lucas Nyeinchan!
@issackali4501
@issackali4501 Жыл бұрын
Hello sir thanks for the lesson, it is really informative. I have a concern/question: where is that demo website hosted.?Is it on your LAN/Network or somewhere on the internet? if it is hosted somewhere on the internet, how will my firewall protect someone's website/application from SQL injection? if the website is hosted on your LAN/Network it's very impressive and makes a lot of sense to me. but from the video, it looks like the demo site is hosted somewhere else on the internet unless I did not get the point well. As for the case of WAF, we normally use it to protect the server hosting our application/sites which are in our LAN/DC. Kindly, enlighten me on this. Maybe my understanding is not ok. Thanks
@KeithBarker
@KeithBarker Жыл бұрын
Thank you Issack Ali! If you want to prevent your internal users, from using a SQL injection attack against sites on the Internet, place the firewall between your users and the internet, and attach the vulnerability profile to the security policy rule that is allowing their initial flows of traffic, from their computers to the Internet. To prevent a SQL injection attack against server you are hosting, place the firewall between the Internet and your hosted server, and attach the vulnerability profile to the security policy rule that is allowing the initial flow of traffic from users on the Internet to your hosted server. The same logic would hold, if you have a server hosted in the cloud. Simply place the FW between it and the clients that access that server. Hope that helps, and thanks for the question.
@issackali4501
@issackali4501 Жыл бұрын
@@KeithBarker Thank you so much for the comprehensive reply and enlightenment. yeah really helped and well understood.🫡
@tomsheldon6398
@tomsheldon6398 8 ай бұрын
Are you Seth Meyers brother? Enjoying your videos. I just reset my PA440 and followed along with the instructions. Since I had unplugged all the cables during the reset, I forgot to reconnect the Management/console port to Interface 2. This caused all kinds of delays until I remembered. Maybe put that bit of info in your videos.
@KeithBarker
@KeithBarker 8 ай бұрын
Thank you @tomsheldon6398!
@ericaures4734
@ericaures4734 Жыл бұрын
How about Checkpoint / Juniper FWs?
@KeithBarker
@KeithBarker Жыл бұрын
Thank you for the suggestion Eric Aures❗ Its been a while since I worked on those, but next time I ramp up on those, especially the Checkpoint, I may make some KZbin videos as well. Thanks for the suggestion.
How To Use A Trusted CA Certificate For Firewall Management | PART 10
8:54
Keith Barker - The OG of IT
Рет қаралды 13 М.
How To Configure SSL Forward Proxy Decryption On The Palo Alto Firewall | PART 8
18:07
Keith Barker - The OG of IT
Рет қаралды 26 М.
Their Boat Engine Fell Off
0:13
Newsflare
Рет қаралды 15 МЛН
Почему Катар богатый? #shorts
0:45
Послезавтра
Рет қаралды 2 МЛН
Ful Video ☝🏻☝🏻☝🏻
1:01
Arkeolog
Рет қаралды 14 МЛН
Bypassing Firewalls With PING!
17:40
Tall Paul Tech
Рет қаралды 82 М.
SQL Injection Attack Tutorial - I didn't know you can do that
12:59
Loi Liang Yang
Рет қаралды 41 М.
How To Factory Reset Your Palo Alto Firewall And Configure IP Management | PART 2
16:43
Keith Barker - The OG of IT
Рет қаралды 42 М.
Palo Alto Firewall Training | Zone Protection Profiles
30:32
Palo Alto Firewall - Packet Capture [2024]
10:47
NETSums
Рет қаралды 6 М.
major security vulnerability found in rust (over hyped?)
8:06
Low Level
Рет қаралды 143 М.
IT Security Tutorial - Preventing SQL injections
7:53
LinkedIn Learning
Рет қаралды 492 М.
Configuring Your Initial Security Policy On A Palo Alto Firewall | PART 7
8:49
Keith Barker - The OG of IT
Рет қаралды 16 М.
Their Boat Engine Fell Off
0:13
Newsflare
Рет қаралды 15 МЛН