VPNs, Proxies and Secure Tunnels Explained (Deepdive)
What is a secure "tunnel"? When I started to learn about computers the name confused me. I couldn't imagine how it works on a technical level. In this video we build upon knowledge from the previous videos, to develop an intuition for what a tunnel, VPN or proxy is.
LiveOverfont (advertisement): https://shop.liveoverflow.com
1. Server Explained: https://www.youtube.com/watch?v=VXmvM2QtuMU
2. Protocol Explained: https://www.youtube.com/watch?v=d-zn-wv4Di8
3. Computer Networking: https://www.youtube.com/watch?v=6G14NrjekLQ
Grab the forwarder.py code: https://gist.github.com/LiveOverflow/8325c58ecf5b385a2028f3174ee47c18
Chapters:
00:00 - Intro and Background
00:53 - Networking as a Blackbox
01:24 - forwarder.py: Forward Data via Networking
02:43 - Using forwarder.py as a Proxy
04:31 - xor_forwarder.py: Forward "XOR Encrypted" Data via Networking
06:58 - The VPN Blackbox
08:10 - VPNs Forward Entire Packets
10:01 - Virtual Network Cards with TUN/TAP
12:34 - Outro
=[ ❤️ Support ]=
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
2nd Channel: https://www.youtube.com/LiveUnderflow
=[ 🐕 Social ]=
→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео VPNs, Proxies and Secure Tunnels Explained (Deepdive) канала LiveOverflow
LiveOverfont (advertisement): https://shop.liveoverflow.com
1. Server Explained: https://www.youtube.com/watch?v=VXmvM2QtuMU
2. Protocol Explained: https://www.youtube.com/watch?v=d-zn-wv4Di8
3. Computer Networking: https://www.youtube.com/watch?v=6G14NrjekLQ
Grab the forwarder.py code: https://gist.github.com/LiveOverflow/8325c58ecf5b385a2028f3174ee47c18
Chapters:
00:00 - Intro and Background
00:53 - Networking as a Blackbox
01:24 - forwarder.py: Forward Data via Networking
02:43 - Using forwarder.py as a Proxy
04:31 - xor_forwarder.py: Forward "XOR Encrypted" Data via Networking
06:58 - The VPN Blackbox
08:10 - VPNs Forward Entire Packets
10:01 - Virtual Network Cards with TUN/TAP
12:34 - Outro
=[ ❤️ Support ]=
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
2nd Channel: https://www.youtube.com/LiveUnderflow
=[ 🐕 Social ]=
→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео VPNs, Proxies and Secure Tunnels Explained (Deepdive) канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
riscure embedded hardware CTF is over - loopback 0x03Live Hacking - Internetwache CTF 2016 - web50, web60, web80LiveOverflow Channel Trailerformat2 on a modern Ubuntu - bin 0x26Deepdive Containers - Kernel Sources and nsenterWhat is a Protocol? (Deepdive)Riscure Embedded Hardware CTF setup and introduction - rhme2 SolderingTCP Protocol introduction - bin 0x1AXSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020Finding 0day in Apache APISIX During CTF (CVE-2022-24112)File Path Race Condition & How To Prevent It - bin 0x31Exploit Fails? Debug Your Shellcode - bin 0x2BNew to Linux? Need Help Understanding Shell Commands?HACKERSPACES ARE AWESOME!Fuzzing Browsers for weird XSS VectorsUnderstanding C Pointer Magic Arithmetic | Ep. 07Solving Pwnable CTF Challenge With Docker WorkflowThe fakeobj() Primitive: Turning an Address Leak into a Memory CorruptionThe HTTP Protocol: GET /test.html - web 0x01What is a Browser Security Sandbox?! (Learn to Hack Firefox)