PinnedCyberBruhArmyinInfoSec Write-upsLAB Setup — ModSecurity || Apache as reverse Proxy || Generate& Install self signed SSL…A: Configure Apache as reverse proxy and the application [demo.testfire.net] should be accessible via local host entry through configured…9 min read·Jan 25, 2022----
CyberBruhArmyPalo Alto -Understanding the NAT/Security Policy ConfigurationUnderstanding the NAT/Security Policy Configuration2 min read·1 day ago----
CyberBruhArmyConfiguring Different Certificate Profiles for Management for Primary and Secondary…Configuring Different Certificate Profiles for Management for Primary and Secondary Panorama/Palo-Alto Firewall(HA)2 min read·Apr 27, 2024----
CyberBruhArmyPalo Alto Firewall Traffic Logs Key ConceptsPalo Alto Firewall Traffic Logs Key Concepts4 min read·Apr 26, 2024----
CyberBruhArmyinInfoSec Write-upsDesigning Micro-Segmentation for Enhanced Security with Jump HostsPrinciple of the architecture4 min read·Apr 9, 2024----
CyberBruhArmyinInfoSec Write-upsWhat happens when a DNS request is made?What server types are used in a DNS check?3 min read·Apr 5, 2024----
CyberBruhArmyinInfoSec Write-upsComprehensive Guide to AWS WAF — Protecting Web ApplicationsThe “Comprehensive Guide to AWS WAF” is course designed to provide participants with a thorough understanding of AWS Web Application…2 min read·Apr 5, 2024----
CyberBruhArmyPractical Firewall Penetration Testing | Firewall AuditBuy Practical Firewall Penetration Testing | Firewall Audit1 min read·Jul 2, 2023----
CyberBruhArmyHow to remove info from Google search?How To Remove Personal Information From The Internet in 20231 min read·Jan 8, 2023----
CyberBruhArmyWhatsApp Proxy // Use //RiskIn the context of WhatsApp, a proxy server could potentially be used to:2 min read·Jan 7, 2023----