YoVDO

Attacking Nextgen Firewalls

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses Network Security Courses Ethical Hacking Courses REST APIs Courses

Course Description

Overview

Explore advanced techniques for attacking next-generation firewalls in this 57-minute conference talk. Dive deep into the architecture and vulnerabilities of Palo Alto Networks firewalls, covering topics such as administrative interfaces, command-line operations, and Linux-based systems. Learn about embedded software stacks, management interfaces, REST APIs, and user identification methods. Witness demonstrations of Global Protect VPN exploitation, web server crashes, and code execution techniques. Gain insights into MIPS architecture, route shell access, and root shell acquisition. Conclude with valuable recommendations for improving firewall security and participate in a Q&A session to further enhance your understanding of next-gen firewall vulnerabilities and attack vectors.

Syllabus

Intro
Introduction
Palo Alto
Features
Agenda
Administrative Interface
Common Line Interface
Linux Architecture
Embedded Software Stack
Management Interface
REST API
User ID
Captive Portal
Client probing
Demo
Global Protect
Global Protect VPN
Web Server Crash
Dead Check
Field Filter Check User
Code Execution
Username
PHP context
PHP body write
MIPS
Route Shell
Root Shell
Recommendations
Questions


Taught by

WEareTROOPERS

Related Courses

Web Engineering II: Developing Mobile HTML5 Apps
Technische Hochschule Mittelhessen via iversity
Introduction to MongoDB using the MEAN Stack
MongoDB via edX
Desarrollo de aplicaciones avanzadas con Android
Universidad Nacional Autónoma de México via Coursera
Utilisez des API REST dans vos projets web
IBM via OpenClassrooms
Extend Your Application with REST Services
Microsoft via edX