1 00:00:00,330 --> 00:00:04,440 So, yes, in this studio, we will discuss about this fight, what actually I have to tell you in the 2 00:00:04,450 --> 00:00:05,670 networking fundamentals. 3 00:00:06,270 --> 00:00:13,360 But however, this I recorded this session so you can actually see the command line interface for the 4 00:00:13,380 --> 00:00:14,910 next phase of the firewall. 5 00:00:15,480 --> 00:00:18,750 So first, let's see what what the firewall is. 6 00:00:19,620 --> 00:00:24,680 So this is a software firewall and this is installed in your operating system by default. 7 00:00:24,690 --> 00:00:28,900 So it will Windows seven can come to the default firewall. 8 00:00:30,150 --> 00:00:36,390 So what the purpose of the firewall is, it will allow or block the connections based on the rules. 9 00:00:36,990 --> 00:00:45,270 So the connections going from the PC to the alternative are called outgoing connections. 10 00:00:46,110 --> 00:00:50,430 So you can see this is outgoing connections. 11 00:00:54,770 --> 00:00:57,720 So the connection is going from your computer to the ring. 12 00:00:58,100 --> 00:01:05,330 And this is called all outgoing connections and the connections coming from Internet to your computer 13 00:01:05,420 --> 00:01:07,340 are called incoming connections. 14 00:01:08,300 --> 00:01:12,890 So it's pretty straightforward, the terminology, so I read in. 15 00:01:14,830 --> 00:01:15,520 Incoming. 16 00:01:19,250 --> 00:01:28,700 So how will this fight war, uh, distinguish between the, uh, the consciences you need to write some 17 00:01:28,700 --> 00:01:34,760 rules so the rules which you write for outgoing connections are called outbound rules. 18 00:01:35,600 --> 00:01:40,250 And the rules, which you write for the incoming connections are called inbound rules. 19 00:01:41,060 --> 00:01:47,420 So let's say an example, your computer, how to access the Internet. 20 00:01:47,870 --> 00:01:48,710 So for that. 21 00:01:52,510 --> 00:02:01,660 So for that, you need to know the number eighty eight so you will know the phone number eighty on this 22 00:02:01,660 --> 00:02:09,490 computer in our current connections, you will set the record open in which the data should be open 23 00:02:09,970 --> 00:02:12,880 and alert for our corrections. 24 00:02:12,880 --> 00:02:19,920 And you can also set the same group for incoming corrections because generally, the Observer said and 25 00:02:19,930 --> 00:02:24,670 our pages did not report, no redirect also for four forty three. 26 00:02:25,240 --> 00:02:30,400 So that really does not matter because most observers uses the portelli. 27 00:02:30,640 --> 00:02:38,620 So you need to set some boundaries and boundaries so that this firewall will allow the connections to 28 00:02:38,770 --> 00:02:40,450 flow from computer to Internet. 29 00:02:41,920 --> 00:02:50,310 So let's assume that Dysport no, it is not there in any of the rules. 30 00:02:50,650 --> 00:02:59,470 So whenever whenever a server or a computer wants to connect to this, our computer on the property, 31 00:03:00,610 --> 00:03:06,090 if there is no inbound route, then it will simply drop the packet. 32 00:03:06,310 --> 00:03:11,350 It will not allow the packet pass through this application. 33 00:03:13,940 --> 00:03:23,180 So there should be incoming are inbound rule for the parade and similar if there are no outbound rules 34 00:03:23,180 --> 00:03:25,460 about a particular policy. 35 00:03:25,490 --> 00:03:34,730 One, two, three, four, then this firewall will not allow it to resolve the port. 36 00:03:34,820 --> 00:03:35,660 One, two, three, four. 37 00:03:38,920 --> 00:03:40,700 So that's sort of what this is. 38 00:03:40,960 --> 00:03:51,190 Now, let's talk about from the point of view so you can also define some seven to thousand and those 39 00:03:51,190 --> 00:03:58,050 spots will only be better if I were a mineral artist and ruining pots would be rocket fire. 40 00:03:58,100 --> 00:03:58,890 All right. 41 00:04:00,280 --> 00:04:06,680 So in general, we will create a massive pyramid, four four four four. 42 00:04:08,560 --> 00:04:09,010 Right. 43 00:04:10,120 --> 00:04:17,470 So you cannot guarantee that this four four four four pot is in the incoming rules are the outgoing 44 00:04:17,470 --> 00:04:17,860 rules. 45 00:04:18,700 --> 00:04:21,420 So in that case, our payload will not execute. 46 00:04:21,880 --> 00:04:29,680 So far that what we are told is we will set change the number of these four four four four to eight 47 00:04:30,940 --> 00:04:36,210 because we expect that this current computer will connect to the Internet via browser. 48 00:04:36,220 --> 00:04:43,660 So that's why we assume that portability will be open and the firewall will just lost the connection 49 00:04:43,660 --> 00:04:44,800 with this prototype. 50 00:04:45,040 --> 00:04:52,780 And it does not check whether it's outgoing or incoming, even though we will, uh, will be creating 51 00:04:52,780 --> 00:04:56,110 a reversal that will be outgoing from this firewall. 52 00:04:56,110 --> 00:04:59,850 So it will become not to not become a problem anymore. 53 00:05:00,160 --> 00:05:05,920 So we put it in the next video to create the payload on the spot. 54 00:05:07,420 --> 00:05:10,960 So I think I hope you have understood this. 55 00:05:12,010 --> 00:05:19,540 Now, let's go ahead and see how these rules look like open a can opener in Williston and you can see 56 00:05:19,540 --> 00:05:21,630 their Windows defender firewall. 57 00:05:23,500 --> 00:05:28,390 As you can see, my father is on for the private networks and public networks. 58 00:05:28,720 --> 00:05:33,970 So this is just opening an awful and technical disadvantage settings. 59 00:05:37,020 --> 00:05:42,600 So now a window will open, know what you're going to use here? 60 00:05:42,620 --> 00:05:49,510 You can configure the rules, you can click on this inbound rules and it will show you the default rules. 61 00:05:49,590 --> 00:05:51,160 The applications have been added. 62 00:05:52,290 --> 00:06:00,710 So whenever you start a computer with, you know, start a new software to ask for access to private 63 00:06:00,720 --> 00:06:05,520 networks, private networks, yosano, so you'll keep you'll say yes. 64 00:06:05,640 --> 00:06:11,360 So whenever your papers, then the firewall will be added to this rules. 65 00:06:13,050 --> 00:06:21,870 So these are the boundaries, so boundaries without any outside or any outside computer connecting to 66 00:06:21,870 --> 00:06:28,740 your computer, and you can create a new rule by using this new rule on this and you're going to see 67 00:06:28,740 --> 00:06:34,890 what type of deal to create, whether you want to control the program as opposed to combat it. 68 00:06:35,880 --> 00:06:43,050 I want to set the rules for the program so I can set the rules whether it should access the Internet 69 00:06:43,050 --> 00:06:50,040 or not, and Dysport Group that can control connections for ARE or people. 70 00:06:50,490 --> 00:06:56,190 And we are going to see this one point and click next. 71 00:06:56,970 --> 00:07:04,710 And what we can do is we need to apply this to reality and we need to switch with it for a number of 72 00:07:04,710 --> 00:07:07,350 puts it want to operate. 73 00:07:07,500 --> 00:07:12,470 That's a 4000 to 5000. 74 00:07:12,630 --> 00:07:14,640 So all on the spot. 75 00:07:14,650 --> 00:07:16,560 What I want to do next. 76 00:07:16,890 --> 00:07:23,930 So I want to allow the connection from the outside computer to my computer or block the connection. 77 00:07:25,260 --> 00:07:26,840 So just forget about this. 78 00:07:26,850 --> 00:07:30,190 This needs authentication so we don't, uh. 79 00:07:31,400 --> 00:07:38,150 She doesn't control any distractions around the block, so whenever I choose this block the connection, 80 00:07:38,360 --> 00:07:48,030 so any computer with the service put 4000 in between 4000 and 5000, then that connection, we will 81 00:07:48,060 --> 00:07:54,030 Blocher click on next and you can see the private or public and click next. 82 00:07:54,070 --> 00:08:00,900 And you can set a name for this in Bonder like this, you can see on your desk batsuit unacceptable. 83 00:08:01,340 --> 00:08:09,400 So I don't want to say this, but we I will say this will in the next year, we will bypass the firewall. 84 00:08:10,940 --> 00:08:13,490 So that's how you create the boundaries. 85 00:08:13,700 --> 00:08:18,420 You need to switch the polls and you need to decide whether to allow that. 86 00:08:18,800 --> 00:08:24,500 The spots are blocked, the spots on the ground, the same way you can create the old boundaries. 87 00:08:25,790 --> 00:08:30,980 So you can click on this new neutral and you can choose the spot and you can choose the number of votes 88 00:08:31,220 --> 00:08:37,970 it's denied any to specific whether to allow block. 89 00:08:38,000 --> 00:08:39,760 So where do you set the block? 90 00:08:39,770 --> 00:08:41,800 Any service from your computer? 91 00:08:42,350 --> 00:08:47,320 You're not going to do with this post. 92 00:08:47,660 --> 00:08:51,770 So that's why these are called the open process. 93 00:08:52,520 --> 00:08:58,280 So we will set some rules in the next few years and then we'll see how to bypass all these rules. 94 00:08:59,480 --> 00:09:02,710 So that's all for this, a failure, basically. 95 00:09:02,750 --> 00:09:03,920 I hope you have understood.