UFW Firewall (Uncomplicated Firewall) - Complete Tutorial

preview_player
Показать описание
Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to set up and manage UFW, the uncomplicated firewall. Uncomplicated Firewall is a program for managing a Netfilter firewall designed to be easy to use. It uses a command-line interface consisting of a small number of simple commands and uses iptables for configuration

⭐SUPPORT HACKERSPLOIT BY USING THE FOLLOWING LINKS:

Use the link above or the code below for 77% Off your order
Promo Code: hacker

I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.

🔹 SUPPORT THE CHANNEL

🔹 GET OUT COURSES
Get a special discount on our courses:
The Complete Deep Web Course 2018:

🔹 SOCIAL NETWORKS - Connect With Us!
-------------------------------
--------------------------------

Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद

#Kali#UFW#Firewall
Рекомендации по теме
Комментарии
Автор

Short, Loud and Clear .
< Learning alot from You, i was able to install pfsense in the company that i am currently working after i saw your pfsense tutorial >
Thank you for your Blessed Efforts.
Zeid Al-Seryani.

Zeid_Al-Seryani
Автор

You really made this easy to understand. I see exactly how UFW works now. Thanks. I was learning about iptables, but seems like ufw can do same thing and seems easier to me.

PoeLemic
Автор

Merci bien grand prof. Tes videos sont vraiment interrescent.

LecodeHeverestofficiel
Автор

Hey there bro Or actually lemme call you sir, It seems their are quite many Indian viewers also on Your channel cause you mentioned your ' thank you for watching' greeting in Hindi. That's our mother tongue. I just loved the way you greeted in different language. Anyway I am following your ETHICAL HACKING SERIES and learning a lot. We as students request you sir, please never stop creating such videos. Even make more similar and much more INFORMATIVE and ADVANCE videos in future. LOVE YOU SIR. And धन्यवाद for your informative videos. By the way धन्यवाद means Thank you in Hindi.

ambikaprasad
Автор

Hey Mr HackerSploit, Mahn... This is huge, i love it... Thanks again

Much love from share

droidhackerr
Автор

Can you please continue with more setups and configurations of Pfsense?

Nimitz_oceo
Автор

thank you sir just this what i need to know ! you doing great job

mohamedebrahim
Автор

9:18 You forgot to mention that you can limit connections to ssh and any other inbound connection by replacing allow with limit. This rule stops brute force connections from a specific IP after six simultaneous connections within thirty seconds.

magburner
Автор

Wow, i love it! Thank you very much! It was indeed pretty simple :D

GuzikPL
Автор

Hi thank U for making these educational & informative ethical hacking videos. Keep up the good work.

Nerzhina
Автор

@HackerSploit You made a mistake when deleting rules 1 and 2. Since when you delete the first rule the second rule becomes rule 1, so you deleted 80/tcp instead.

lars-magnusskog
Автор

Thanks for this video, very nice explanation :) !

majki
Автор

Awesome. Thank a lot bro your doing an amazing job.

siddharthtadury
Автор

You're doing such an awesome job dude!!

preetamvarun
Автор

If you are on a remote host make sure to allow ssh by running "sudo ufw allow ssh" so you don't lock yourself out of your server.

alittleextra
Автор

18:35 you did set it to .1/24 but masks take subnets not adresses so ufw changed it automatically to the subnet adress of .0/24

aonodensetsu
Автор

Thank you Top presentation now subscribed will be watching others.

footloosecamping
Автор

@HackerSploit does the UFW accept bulk IP address from txt or csv file?if so, how?

samson
Автор

Plz make a video on unlocking pattern lock without data loss not enabling USB debbuging or backup ...only using Kali Linux ....plz make a video on THIS if u can... because till now nobody made any real video on this...

jackjohn
Автор

Could you do something like exploit makin? Like analysing software etc

VNMHCKR