Skip to main content

HackerSploit (Alexis Ahmed)

Securing Nginx Web Server | Hackersploit Linux Security

NGINX is an open source web server with powerful load balancing, reverse proxy, and caching features. In this video, HackerSploit will show you how to better secure your Nginx server by disabling the default Nginx header and adding password authentication.

Securing Apache 2 | HackerSploit Linux Security

Apache is a popular web server and is part of the LAMP stack that can host apps like WordPress on a server. In this video, HackerSploit shows some basic steps for securing your Apache web server.

Linux Monitoring and Logging | HackerSploit Linux Security

In this video, HackerSploit shows various tools and commands for logging and monitoring that will give you a better view of what is happening within your Linux instance.

UFW Full Tutorial | HackerSploit Linux Security

UFW, or uncomplicated firewall, is a frontend for managing firewall rules in Arch Linux, Debian, or Ubuntu. In this video, HackerSploit will show how UFW is used through the command line, allowing you to make firewall configuration easy (or, uncomplicated).

iptables Complete Guide | HackerSploit Linux Security

iptables is a user-space utility program that allows a system administrator to configure the IP packet filter rules of the Linux kernel firewall. This video will help you understand how to use iptables, cover some common rules, and give you an overview of how to build iptables commands.

How to Secure WordPress | HackerSploit Linux Security

WordPress is a popular CMS and website creation software used by millions of users. In this video, HackerSploit will take you through the steps required to keep your WordPress site secure, including installing SSL certificates, installing a firewall, enabling two-factor authentication, and more.

Configuring Root Access | HackerSploit Linux Security

In this follow up video to securing your SSH, HackerSploit shows how to add users to the sudo group. Taking security a step further, we'll disable the root user so that it can't be accessed remotely or locally.

Brute Force Protection | Linux Security with HackerSploit

In part 2 of the Linux Security series, HackerSploit shows how to set up fail2ban on a server to prevent brute force SSH attacks.

How to Secure SSH | Linux Security with HackerSploit

In this series, HackerSploit takes us through a scenario where we'll have to secure a WordPress instance from SSH based attacks.