HACKERS ONLY:
Essential Ports for Network Protocols & Services
HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.
MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.
RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.
Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
Essential Ports for Network Protocols & Services
HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.
MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.
RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.
Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
Now it's Free Limited, Official Cisco Intrusion Detection & Prevention course:
YOU Will Learn:
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall
Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco
Secure Firewall Threat Defense
Configure basic Network Address
Translation on Cisco Secure
Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager
ACCESS:
https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
YOU Will Learn:
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall
Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco
Secure Firewall Threat Defense
Configure basic Network Address
Translation on Cisco Secure
Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager
ACCESS:
https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
LinkedIn
What you should know - Cisco Routers Video Tutorial | LinkedIn Learning, formerly Lynda.com
Join Lisa Bock for an in-depth discussion in this video, What you should know, part of Cisco Network Security: Intrusion Detection and Prevention.
Top 10 Most Dangerous AI Tools Used By Hackers In 2024 (INTEL-AS-A-WEAPON)
https://youtu.be/Y49CmATRggg
https://youtu.be/Y49CmATRggg
YouTube
Top 10 Most Dangerous AI Tools Used By Hackers In 2024 (INTEL-AS-A-WEAPON)
These AI tools range from sophisticated malware creation to password cracking and much more. Explore how these darkweb AI models work, their origins, and what their rise means for the future of cybersecurity.
AI Marketplace: https://taimine.com/
Deep Learning…
AI Marketplace: https://taimine.com/
Deep Learning…
This media is not supported in your browser
VIEW IN TELEGRAM
🎩 Hacker Prank
Free Baby. Amazon Web Services (AWS) - Zero to Hero
https://www.udemy.com/course/amazon-web-services-aws-v/
https://www.udemy.com/course/amazon-web-services-aws-v/
Udemy
Free Amazon AWS Tutorial - Amazon Web Services (AWS) - Zero to Hero
Beginners, Zero to Hero. AWS EC2 web server, NodeJS Server, AWS RDS database server, S3, SES & CloudWatch. FREE - Free Course
Hackers Pro's Utilities:
Abusing ML model file formats to create malware on AI systems: A proof of concept
https://github.com/Azure/counterfit/wiki/Abusing-ML-model-file-formats-to-create-malware-on-AI-systems:-A-proof-of-concept
Abusing ML model file formats to create malware on AI systems: A proof of concept
https://github.com/Azure/counterfit/wiki/Abusing-ML-model-file-formats-to-create-malware-on-AI-systems:-A-proof-of-concept
GitHub
Abusing ML model file formats to create malware on AI systems: A proof of concept
a CLI that provides a generic automation layer for assessing the security of ML models - Azure/counterfit
Forwarded from UNDERCODE COMMUNITY (dvm)
What is the Tor Nodes Safety Level in 2024 ?
Final Results
71%
1% unsecure
0%
50%
14%
90% Anonymous
14%
Happy new year (I'm a beginer)😊
What operating system does your AirPods run?
Sounds like a weird question.
Until you realize you have the equivalent processing power of an iPhone 4 in each ear.🙈
Bluetooth audio SoCs are seldom talked about, but a fascinating field.
AirPods specifically run RTKit, a Real-time Operating System targeting small ARM chips, written mostly in C++.
Small Real-time os(s) are often used in audio devices and peripherals, as the slightest hiccup in scheduling would be immediately (aka audibly) obvious. Timings are extremely tight.
Much of the public knowledge about RTKit comes from the Asahi Linux project.
RTKit firmware is actually bundled into iOS updates; a simple extraction of the firmware will show numerous .im4p files (which are really just packed Mach-O).
Sounds like a weird question.
Until you realize you have the equivalent processing power of an iPhone 4 in each ear.🙈
Bluetooth audio SoCs are seldom talked about, but a fascinating field.
AirPods specifically run RTKit, a Real-time Operating System targeting small ARM chips, written mostly in C++.
Small Real-time os(s) are often used in audio devices and peripherals, as the slightest hiccup in scheduling would be immediately (aka audibly) obvious. Timings are extremely tight.
Much of the public knowledge about RTKit comes from the Asahi Linux project.
RTKit firmware is actually bundled into iOS updates; a simple extraction of the firmware will show numerous .im4p files (which are really just packed Mach-O).
Enable Security Defaults in Microsoft Entra ID:
1. Sign in to Microsoft Entra admin center
2. Expand Identity
3. Select Overview
4. Click on Properties
5. Select Manage security defaults
6. Set Security defaults to Enabled
7.Click Save
Note: If your organization uses Conditional Access policies, you are prevented from enabling Security Defaults. You can use Conditional Access to configure custom policies that enable the same behavior 1 as those provided by Security Defaults.
1. Sign in to Microsoft Entra admin center
2. Expand Identity
3. Select Overview
4. Click on Properties
5. Select Manage security defaults
6. Set Security defaults to Enabled
7.Click Save
Note: If your organization uses Conditional Access policies, you are prevented from enabling Security Defaults. You can use Conditional Access to configure custom policies that enable the same behavior 1 as those provided by Security Defaults.
Ethical Hacking in 15 Hours - 2023 Edition
By The Owner of TCM Security:
https://youtu.be/3FNYvj2U0HM?list=PLLKT__MCUeixqHJ1TRqrHsEd6_EdEvo47
By The Owner of TCM Security:
https://youtu.be/3FNYvj2U0HM?list=PLLKT__MCUeixqHJ1TRqrHsEd6_EdEvo47
YouTube
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)
0:00 - Introduction/whoami
6:43 - A Day in the Life of an Ethical Hacker
27:44 - Effective Notekeeping
34:27 - Important Tools
39:51 - Networking Refresher: Introduction
41:06 - IP Addresses
54:18 - MAC Addresses
57:35 - TCP, UDP, & the Three-Way Handshake…
6:43 - A Day in the Life of an Ethical Hacker
27:44 - Effective Notekeeping
34:27 - Important Tools
39:51 - Networking Refresher: Introduction
41:06 - IP Addresses
54:18 - MAC Addresses
57:35 - TCP, UDP, & the Three-Way Handshake…