- 64
- 44 729
Hacksi
Приєднався 25 бер 2017
I share cyber security-networking-related videos and learning stuff every day. Spread knowledge and awareness.
Welcome to my channel! I share videos about malware analysis, reverse engineering, and other cybersecurity topics to help you take your career to the next level!
Ways to connect:
Twitter: solarbuster10
www.linkedin.com/in/hacksi/
medium.com/@huseyin.eksi
Welcome to my channel! I share videos about malware analysis, reverse engineering, and other cybersecurity topics to help you take your career to the next level!
Ways to connect:
Twitter: solarbuster10
www.linkedin.com/in/hacksi/
medium.com/@huseyin.eksi
Real Time SOC Analyst Simulation | SOC Simulator From TryHackMe | Phishing Unfolding
Welcome to Hacksi. I'm a Senior Security Analyst with years of experience in tech. If you are interested, make sure to hit that subscribe button!
This video introduces the TryHackMe SOC (Security Operations Center) Simulator, focusing on its real-world attack simulation capabilities.
#phishing #malwareanalysis #cybersecurity #infosec #tryhackme
Follow & Connect
Linkedin
[linkedin.com/in/hacksi]( / hacksi )
Medium
[medium.com/@huseyin.eksi]( / huseyin.eksi )
Twitter
[ solarbuster10]( / solarbuster10 )
This video introduces the TryHackMe SOC (Security Operations Center) Simulator, focusing on its real-world attack simulation capabilities.
#phishing #malwareanalysis #cybersecurity #infosec #tryhackme
Follow & Connect
[linkedin.com/in/hacksi]( / hacksi )
Medium
[medium.com/@huseyin.eksi]( / huseyin.eksi )
[ solarbuster10]( / solarbuster10 )
Переглядів: 494
Відео
How to Create a vSOC environment on Hetzner using Proxmox?
Переглядів 2,4 тис.14 днів тому
Deploy a powerful and cost-effective Security Operations Center (SOC) environment on Hetzner using Proxmox! This video guides you through the process of network planning and selecting essential SOC tools, focusing on practical setup rather than individual tool installations (detailed instructions are on my GitHub). ✅Proxmox for virtualization ✅ Wazuh as a SIEM to collect logs and create custom ...
LetsDefend Alert Analysis SOC169 - Possible IDOR Attack Detected
Переглядів 1092 місяці тому
In this video I showed how to deal with IDOR attacks and performed alert analysis in LetsDefend.io If you find this video helpful, don't forget to like and subscribe to my channel! Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10 Case Related Links: portswigger.net/web-security/access-control/idor www.abuseipdb.com/check/134.209....
QRadar: How to install WinCollect 10 | Qradar Series (Part 2)
Переглядів 3913 місяці тому
In this video I walkthrough how to install and configure a WinCollect 10 agent on your system. For more information, see the following documentation: www.ibm.com/community/101/qradar/wincollect/ Wincollect CLI Installation Installing WinCollect 10 using the command line www.ibm.com/docs/en/qradar-common?topic=10-installing-wincollect-using-command-line Run the following command: msiexec.exe /qn...
How To Install Qradar Community Edition 7.5 | VMware Workstation | Qradar Series (Part 1)
Переглядів 1,4 тис.3 місяці тому
QRadar Community Edition is a fully-featured free version of QRadar that is low memory, low EPS, and includes a perpetual license. This version is limited to 100 events per second and 5,000 network flows a minute, supports apps, but is based on a smaller footprint for non-enterprise use. This tutorial video explains the process of installing and configuring the IBM QRadar Community Edition v7.5...
TryHackMe | Summit Walkthrough | Malware - Detection Analysis
Переглядів 3624 місяці тому
In this video I walkthrough the room called Summit on tryhackme.com. If you find this video helpful, don't forget to like and subscribe to my channel! #malwareanalysis #cybersecurity #infosec #digitalforensics #tryhackme Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10
Linux Malware Analysis 101 under 10 minutes
Переглядів 2487 місяців тому
In this video, we'll delve into the intriguing world of Linux malware analysis. You'll learn the basics of how to dissect and understand malware on the Linux platform, from recognizing the symptoms of a malware infection to the techniques and tools used for analysis. We'll cover everything from the initial identification of malicious activity, to the in-depth analysis of the malware's functiona...
How To Become A Purple Teamer! C2 Attack and Defend from BlueCapeSecurity
Переглядів 1938 місяців тому
In this video, you will learn how to become a skilled Purple Teamer, mastering the art of both attacking and defending in the cyber security realm. From understanding the tactics and techniques of C2 (Command and Control) attacks to effectively defending against them, this tutorial will provide you with the knowledge and skills needed to excel in the world of cyber security. Whether you are a b...
10 LOLBINS YOU SHOULD KNOW!
Переглядів 1,1 тис.9 місяців тому
In this presentation, We get into the world of living off the land techniques in cybersecurity, also known as LOLBIN. Discover the top 10 LOLBIN techniques that every cybersecurity enthusiast should know to enhance their skills and stay ahead of cyber threats. Stay informed, stay protected. Project Link: lolbas-project.github.io/# If you enjoy this video, like&subscribe to my channel #cybersecu...
Unveiling Ransomware Tactics: A MITRE ATT&CK Analysis of 5 Samples
Переглядів 3329 місяців тому
Description: Dive into the world of cybersecurity as we dissect 5 distinct ransomware samples using the MITRE ATT&CK framework. Discover the intricate methods employed by each sample to infiltrate systems and hold data hostage. Join us as we unravel the tactics, techniques, and procedures utilized by cybercriminals to exploit vulnerabilities and launch devastating attacks. Stay informed, stay p...
Procdot 101 Simplified Visual Analysis
Переглядів 51310 місяців тому
#malware #wireshark #procdot In this video, I cover an awesome utility called ProcDOT. As you are likely aware, Sysinternals’ Process Monitor, also known as Procmon, in combination with PCAP data provides a treasure trove of information that is commonly used in behavioral malware analysis. The problem is, data from those sources is disparate, and typically manual analysis is required to correla...
TryHackMe: Disk Analysis & Autopsy Walkthrough
Переглядів 52610 місяців тому
In this video, we are solving the Disk Analysis & Autopsy room on the TryHackMe platform. tryhackme.com/room/autopsy2ze0 #cybersecurity #tryhackme #autopsy #malware #digitalforensics Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10 CHAPTERS: 00:44 Introduction 02:36 1. Question 03:30 2. Question 04:12 3. Question 05:06 4. Questio...
Basic Reverse Engineering | TryHackMe Basic Malware RE
Переглядів 52810 місяців тому
In this video walkthrough, we covered the basics and fundamentals of reverse engineering using an example room from tryhackme. tryhackme.com/room/basicmalwarere #cybersecurity #tryhackme #ghidra #malware Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10 CHAPTERS: 00:00 Introduction 00:50 1. Question 01:56 2. Question 03:16 3. Ques...
Uncovering the Emotet Malware: Any.Run Cloud Sandbox Analysis
Переглядів 10611 місяців тому
I show you a malware analysis tool called Any.run in today's video. This is a sandbox service offered online that can provide a safe environment to analyze malware. #malware #anyrun #threatintelligence Links Link to the sample:app.any.run/tasks/6857bf09-504d-4ec8-a1e1-18e88d78c5a0/? Anyrun :any.run/? Anyrun's youtube channel where you can find a lot of valuable videos:ua-cam.com/users/ANYRUN? C...
Phishing Email Analysis with Any.run / Remcos
Переглядів 36811 місяців тому
In this video, I take a deep dive into analyzing a phishing email using Any.run. Phishing emails are a common method used by cybercriminals to steal sensitive information, and it's important to know how to spot and analyze them. I walk through the process of using Any.run to dissect the email and identify any malicious elements, providing valuable insights into how to protect yourself and your ...
Phishing Email Analysis with Any.Run Cloud Sandbox
Переглядів 1 тис.11 місяців тому
Phishing Email Analysis with Any.Run Cloud Sandbox
How to Analyze a Malicious Powershell Script & Fileless Malware
Переглядів 83211 місяців тому
How to Analyze a Malicious Powershell Script & Fileless Malware
How to DECRYPT HTTPS Traffic with Wireshark
Переглядів 2,6 тис.Рік тому
How to DECRYPT HTTPS Traffic with Wireshark
Learning Wireshark - Analyzing a pcap file Ep:2
Переглядів 406Рік тому
Learning Wireshark - Analyzing a pcap file Ep:2
Shellcode Analysis: A Step-by-Step Tutorial with x64 Debugger
Переглядів 388Рік тому
Shellcode Analysis: A Step-by-Step Tutorial with x64 Debugger
TryHackMe Advent of Cyber 2023 Day 1 - Talking with a Language Model!
Переглядів 27Рік тому
TryHackMe Advent of Cyber 2023 Day 1 - Talking with a Language Model!
How to Install Kali Linux&Virtual Box&Windows10 VM
Переглядів 113Рік тому
How to Install Kali Linux&Virtual Box&Windows10 VM
SOC Investigation How to analyze a Malicious Word Document
Переглядів 7312 роки тому
SOC Investigation How to analyze a Malicious Word Document
TryHackMe! Advent of Cyber 2022 Kick-Off Day 1
Переглядів 342 роки тому
TryHackMe! Advent of Cyber 2022 Kick-Off Day 1
Intro to Endpoint Security - Tryhackme Platform
Переглядів 772 роки тому
Intro to Endpoint Security - Tryhackme Platform
Advent of Cyber Day 9: Packet Analysis with Wireshark
Переглядів 732 роки тому
Advent of Cyber Day 9: Packet Analysis with Wireshark
Let’s Defend: Event 62 - SOC128 - Malicious File Upload Attempt
Переглядів 602 роки тому
Let’s Defend: Event 62 - SOC128 - Malicious File Upload Attempt
Investigation of SOC175 CVE-2022-41082 On LetsDefend.io
Переглядів 1322 роки тому
Investigation of SOC175 CVE-2022-41082 On LetsDefend.io
Malware Dynamic Analysis - Trickbot xls
Переглядів 3412 роки тому
Malware Dynamic Analysis - Trickbot xls
Cortex XSOAR SentinelOne Integration Network Quarantine Automation
Переглядів 2262 роки тому
Cortex XSOAR SentinelOne Integration Network Quarantine Automation
no words wow
thanks, very interesting :)
Nice breakdown of LOLBINs (aka LOLBAS). Thank you
can you explain whats the point of this map with all the ongoing attacks all over the world is? You just care about your own infrastructure and not others right?
@@leoguy7758 Generally in soc environments there are big screens and mostly its used to track how many alerts created daily and other stuff.(Most of the time this data is inaccurate.) I thought a threatmap from radware will look good on my landing page as well. I use that page to redirect other tools in soc.
Take a look at this ua-cam.com/video/9bfQnzyZ2Zo/v-deo.htmlsi=5o_M4Q6OHXCIBT-i
@@ihacksi ohh ok. thank you
Could it be modified for use in homelab without relying on hetzner?
Yes, definitely. Reason i am using hetzner is i dont have a homelab that can run 24h straight.
I have talked to hetzner customer service a while ago and they told me that they suspend services that use honeypots or are serving as honeypots
I only ran for one month and received no message from Hetzner.
Yeah it depends on how many abuse messages they get from your services regarding open ports and so on. Mine lastet a few weeks only
Impressive! Thanks for the content.
Thanks for watching! Next goal is build the same or better in AWS.
05min - speed run : )
top
Hi, I successfully installed the QRadar VM following part 1 but can't access the dashboard in the browser due to network issues. Could you specify which ports to configure in VMware, besides selecting NAT? The network settings weren’t covered in the QRadar CE instructions. Could you make a video on this or share the details here? I haven't found any videos on UA-cam specifically for installing QRadar CE 7.5 on VMware Workstation. Thanks in advance.
@@bella_ame If you set it to nat on vmware workstation and if the qradar services are running properly, you should have access to the web ui by using the IP you selected. There is no other settings for this one.
@@ihacksi so we dont need to add any port (like 8444) or the ip we selected to add on vm> network configurations... ???
@@bella_ame nop just open the browser and access yourvmip or yourvmip will do the work. There is no specific port runs on 443 on my end
I have followed the exact steps but when *power on the vm* facing the following error.... ...... Sat Oct 19 03:16:27 UTC 2024 [create-partitions.sh] ERROR: Disk sda is only 25600 MB, need at least 106496 MB ERROR: The total disk space does not meet the minimum disk space requirement ....... help will be appreciated!
@@bella_ame vm disk space is not enough. Recommended settings are at 250 GB. I used 300 in the video. Delete that vm and create a new one with 250
@@ihacksi Hard Disk? Soory I am a new learner, still confused where to select 250 GB? (video timestamp) ..... I have kept the following: Name: Red Hat Enterprise Linux 8 64-bit Location: D:\IBM Qradar CE Version: Workstation 17.x Operating System: Red Hat Enterprise Linux 8 64-bit Hard Disk: 25 GB, Pre-allocated Memory: 13540 MB Network Adapter: NAT Other Devices: 4 CPU cores, CD/DVD, USB Controller, Printer, Sound Card
@@bella_ame As you mentioned Hard disk 25 GB, change that to 250 GB.
@@ihacksi If it is set here "Hard Disk: 25 GB, Pre-allocated".... is not it too much?!... like the recommended said 20 GB... as its pre-allocated, takes up all storage of system..
@@bella_ame IBM qradar image needs space to build the application. This is not a normal ubuntu/devian installment thats why you will need a lot of space
This is my favorite video, thanks bro
Glad you liked it😊
thx for guide but where i can see part 2?
@@sportyoff I will be recording this weekend hopefully.
@@ihacksi my brother where're you?
Thanks for creating this demostration. Looking for more such.
Why is this video blurry on my end...?
Video was captured 720p, if you are using a large display that will look blurry.
The questions are good and the idea is good as well but improve your preattentions
Hello, so this questions guide us to see chain of events? Am new to this analysis
Yes they do
So are this the only questions should I answer in the chain of events?
Simple and understandable explanation....Great video :)
Glad you liked it!
Glad you liked it! 😊
The content looks excellent. I’m eagerly awaiting your content on #anyrun. 👍🏻
Where is your hat bro ? 😅
I wore so many hats over the years, guess I forgot my white hat 😀
@@ihacksi 😅
Recent studies on mouse ergonomics suggest that scrolling back up to smash the like button increases wrist strength by 7.3% on average.
Perfect 👌🏻
There are lots of useful information in this video. Thanks for sharing.
Hey bro, what is the name of background sound ?
ua-cam.com/users/source7GlsxNI4LVI/shorts?si=JoQS7JqCZMLov8Pu
Very nice 👍🏻
Thank you 👍
To the point
Pasaklı laptop 😂
😂😂
Please keep producing useful content like this 🙏🏻
Good video! Just a tip. Make the text a little bigger. Really hard to read even at 1440p
Thanks 🙏 I have a 43 inch monitor since I create it at 4k everything seemed fine to me. 😀. Let me figure out a way.
So, you're just decrypting your own data that you generated?
It can be applied to any other example like a malware uses https to send data
Hello please if I want to explain the malicious actions in word,how do I do that
Hi Usman, if you have a virtual machine to analyze samples you can use olevba tool to identify malicious actions of a word document. You can also record other artifacts with procmon. Google these tools and use 👍
The pcap file has a password to open the file, can you help with the password
Hi I remember as password = infected
Appreciate it, quick and to the point.
Good video. Thank you
👏👏👏👏👏👍👍👍👍👍
Thanks for your positive reply sir, Have a good day
I was going to say "adversaries" :))
I stutter in both languages ENG-TR :)
Helpful!
Thanks brother :)
👍🏻
Thanks for your support.
Your hat is awesome bro :) 👏🏻👏🏻
We have a dream! One day !! 👏🏻👏🏻
Inshallah brother, one day :)
Very very good solution
𝓅𝓇𝑜𝓂𝑜𝓈𝓂 😇
👍
You are awesome bro !
It's your reflection 🙂
What a nice motivation babayigit !
Thanks big brother. #TekYolSakal
Excellent video! Thanks bro 👍🏻
It would be better ıf TTnet wouldnt screw my connection 🤕
@@ihacksi 🧐
This video great!!
The problem I ran into had to do with the unstable shell that we were both using. This took me a while to figure out. I would recommend watching john Hammond's walkthrough if you're still curious
Thank you Anthony ,