Комментарии:
I'm just curious, how did you find that Website ?
ОтветитьHell yeah man, I'm studying for the sec+ and can't find many good videos on the tools I'll be using so thank you for this! Definitely gonna sub & check out your other videos after this one
ОтветитьAny chance you could do videos on other tools and how to get practice at home? Can't find anything like that
ОтветитьGreat video as someone who wants to get into an SOC analyst role!
Ответитьamazing video. subbed.
ОтветитьAny chance we can get a video like this but on the Kali box we built in AWS ? Thanks ! Keep up the great work
ОтветитьLove your content man. Very insightful. Thanks so much
ОтветитьThis is pure gold!!!
ОтветитьYou can run malicious files inside a Sandbox such as VirtualBox / VMware etc ... As long as you disable VM to host sharing it should be safe
ОтветитьGreat video. You've made it really easy to understand. Thank you
ОтветитьJerry, Tremendous!
ОтветитьBefore downloading the files I always check the url and md5 hash on VirusTotal. Just to be a little on the safer side.
ОтветитьHow do you know it’s endpoint
ОтветитьYou are super cool and this excerise is very useful.. keep posting more videos👍🏻
ОтветитьGreat resourceful video
ОтветитьThey should make a site like this with CSV log files to practice with SPLUNK
Ответитьhow do you get dark mode for wireshark? also, is this available for windows
Ответитьgreat video but bad resolution... my eyes gave up.
ОтветитьI love this channel!!
ОтветитьThanks so much! So helpful ❤️
Ответитьwhy i can't find download video option ?
ОтветитьThaks sir this will helo me alot in ctfs
ОтветитьI am preparing for a SOC I technical interview. This is at least the 3rd video of yours that I have found extremely helpful. Thank you for continuing to make amazing content.
Ответитьthanks man I actually have an SOC 2 interview on Monday I'm gunna smash this malware traffic analysis site all weekend.
Ответить“Per say“?
Ответитьthank you mannn
ОтветитьCan you explain please how do I add Cname string column?
Ответитьhow i become good at wireshark?
ОтветитьAround Tshark tcpdump are important tools as analyst?
ОтветитьHow long should traffic be captured which is indicative of malware, RAT,?
Do malware send beacons if the phone is idle yet connected to the internet ?
Kindly advice.
what is the password for the answer pdf?
Ответить