PinnedCyberBruhArmyinInfoSec Write-upsLAB Setup — ModSecurity || Apache as reverse Proxy || Generate& Install self signed SSL…A: Configure Apache as reverse proxy and the application [demo.testfire.net] should be accessible via local host entry through configured…9 min read·Jan 25, 2022----
CyberBruhArmyCheck Point Firewall IPSec VPN Troubleshooting Decision DiagramCheck Point Firewall IPSec VPN Troubleshooting Decision Diagram3 min read·10 hours ago----
CyberBruhArmytcpdump for IPSec VPN Troubleshooting on Check Point Firewalltcpdump for IPSec VPN Troubleshooting on Check Point Firewall3 min read·10 hours ago----
CyberBruhArmyinLiveOnNetworkList of all our Cyber Security Course🎉 Exciting Opportunity Alert! 📚🆓2 min read·1 day ago----
CyberBruhArmyPalo Alto -Understanding the NAT/Security Policy ConfigurationUnderstanding the NAT/Security Policy Configuration2 min read·May 4, 2024----
CyberBruhArmyConfiguring Different Certificate Profiles for Management for Primary and Secondary…Configuring Different Certificate Profiles for Management for Primary and Secondary Panorama/Palo-Alto Firewall(HA)2 min read·Apr 27, 2024----
CyberBruhArmyPalo Alto Firewall Traffic Logs Key ConceptsPalo Alto Firewall Traffic Logs Key Concepts4 min read·Apr 26, 2024----
CyberBruhArmyinInfoSec Write-upsDesigning Micro-Segmentation for Enhanced Security with Jump HostsPrinciple of the architecture4 min read·Apr 9, 2024----
CyberBruhArmyinInfoSec Write-upsWhat happens when a DNS request is made?What server types are used in a DNS check?3 min read·Apr 5, 2024----
CyberBruhArmyinInfoSec Write-upsComprehensive Guide to AWS WAF — Protecting Web ApplicationsThe “Comprehensive Guide to AWS WAF” is course designed to provide participants with a thorough understanding of AWS Web Application…2 min read·Apr 5, 2024----