Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to set up and manage UFW, the uncomplicated firewall. Uncomplicated Firewall is a program for managing a Netfilter firewall designed to be easy to use. It uses a command-line interface consisting of a small number of simple commands and uses iptables for configuration

HACKERSPLOIT WEBSITE:

⭐SUPPORT HACKERSPLOIT BY USING THE FOLLOWING LINKS:

NordVPN:
Use the link above or the code below for 77% Off your order
Promo Code: hacker
Patreon:

I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.

🔗 HackerSploit Website:

🔹 SUPPORT THE CHANNEL
NordVPN Affiliate Link:
Patreon:

🔹 GET OUT COURSES
Get a special discount on our courses:
The Complete Deep Web Course 2018:

🔹 SOCIAL NETWORKS – Connect With Us!
——————————-
Facebook:
Twitter:
Instagram:
Patreon:
——————————–

Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d’avoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद

#Kali#UFW#Firewall

Nguồn: https://codeigniterbrasil.com

Xem thêm bài viết khác: https://codeigniterbrasil.com/lap-trinh-linux/

30 Comments

X Ruan

May 12, 2020

What if I accidentally run 'sudo ufw deny ssh' on my remote server? Will I be locked out of my server forever? (If I have only ssh access)

Reply

Poe Lemic

May 12, 2020

You really made this easy to understand. I see exactly how UFW works now. Thanks. I was learning about iptables, but seems like ufw can do same thing and seems easier to me.

Reply

Lars-Magnus Skog

May 12, 2020

@HackerSploit You made a mistake when deleting rules 1 and 2. Since when you delete the first rule the second rule becomes rule 1, so you deleted 80/tcp instead.

Reply

Zeid ALSeryani

May 12, 2020

Short , Loud and Clear .
< Learning alot from You, i was able to install pfsense in the company that i am currently working after i saw your pfsense tutorial >
Thank you for your Blessed Efforts.
Zeid Al-Seryani.

Reply

Gregory Turner

May 12, 2020

Excellent video, thank you.

Reply

majiri eyowel

May 12, 2020

If you are on a remote host make sure to allow ssh by running "sudo ufw allow ssh" so you don't lock yourself out of your server.

Reply

Foot loose Camping

May 12, 2020

Thank you Top presentation now subscribed will be watching others.

Reply

Nikola Nojic

May 12, 2020

I truly love this channel

Reply

Namis alha

May 12, 2020

i've wifi and i have many devices connected to it ,can i use ufw to prevent a device from access youtube for example?

Reply

Dhaiwat Mehta

May 12, 2020

is there any soft or script to get all urls from dork…. line "intitle:index of" as input and 1000,2000 urls as output ?

Reply

V3N0M H4CK3R

May 12, 2020

Could you do something like exploit makin? Like analysing software etc

Reply

Jack John

May 12, 2020

Plz make a video on unlocking pattern lock without data loss not enabling USB debbuging or backup …only using Kali Linux ….plz make a video on THIS if u can… because till now nobody made any real video on this…

Reply

Scott Reynolds

May 12, 2020

Hi Alexis. Quick question, off topic. Ive got kali 2019.1 installed and when I do apt search it shows Ive got metasploit v5 but when I go into msfconsole it shows as v4.16.58. Im all updated and upgraded, any ideas, would be a grate help

Reply

Dazs

May 12, 2020

@Hackersploit Can u show us how to force the victim to connect to a fake login page when he connect to the wifi ?

Any one knows ?

Reply

Stinky Pete

May 12, 2020

I always hear of data breaches in Yahoo and facebook but I have a question. Do the companies encrypt their data? And if so than how do these criminals still get away with millions of accounts. It makes no sense. I hope you can help me by answering my question

Reply

Shivmanu Mangat

May 12, 2020

ONE IMPORTANT QUESTION.. HOW DANGEROUS IS TOR EXIT NODE ? CAN SOMEONE FIND THEY REAL IP ADDRESS TRACKING TOR EXIT NODE IF YES HOW WE CAN AVOID THAT ? THX

Reply

Nour Maher

May 12, 2020

Video about bug bounty programs!

Reply

Ananthu s kumar

May 12, 2020

plz teach iptables

Reply

Mano b

May 12, 2020

Thanks for sharing video , very useful for my cloud Server subscribed from www.datasoft.ws

Reply

Faheem Khan

May 12, 2020

I am from India please make a series of nessus scanner

Reply

Eric Smith

May 12, 2020

Thanks for all your videos. I noticed in the description you listed russian second on that thank you roseta stone list, in the event youre Russian, do you know any good Russian websites for cyber security info or news? Thanks, спасибо

Reply

Nerzhina

May 12, 2020

Hi thank U for making these educational & informative ethical hacking videos. Keep up the good work.

Reply

Lone Ghost _/__/_

May 12, 2020

“If it isn’t already self explanatory.” LOL

Reply

HotlineJacket

May 12, 2020

Wow, i love it! Thank you very much! It was indeed pretty simple 😀

Reply

Nahidul Islam

May 12, 2020

This channel is awesome

Reply

Sound Spoon

May 12, 2020

iptables next please!!

Reply

Lecode Heverest officiel

May 12, 2020

Merci bien grand prof. Tes videos sont vraiment interrescent.

Reply

Shand baron

May 12, 2020

Why did you make so many bots for you channel? Few comments and 239k followers, such a shame

Reply

aaryan saharan

May 12, 2020

Please Introduce Bug hunting Series.

Reply

Siddharth Tadury

May 12, 2020

Awesome. Thank a lot bro your doing an amazing job.

Reply

Leave a Reply