Hacksi
Hacksi
  • 64
  • 44 729
Real Time SOC Analyst Simulation | SOC Simulator From TryHackMe | Phishing Unfolding
Welcome to Hacksi. I'm a Senior Security Analyst with years of experience in tech. If you are interested, make sure to hit that subscribe button!
This video introduces the TryHackMe SOC (Security Operations Center) Simulator, focusing on its real-world attack simulation capabilities.
#phishing #malwareanalysis #cybersecurity #infosec #tryhackme
Follow & Connect
Linkedin
[linkedin.com/in/hacksi]( / hacksi )
Medium
[medium.com/@huseyin.eksi]( / huseyin.eksi )
Twitter
[ solarbuster10]( / solarbuster10 )
Переглядів: 494

Відео

How to Create a vSOC environment on Hetzner using Proxmox?
Переглядів 2,4 тис.14 днів тому
Deploy a powerful and cost-effective Security Operations Center (SOC) environment on Hetzner using Proxmox! This video guides you through the process of network planning and selecting essential SOC tools, focusing on practical setup rather than individual tool installations (detailed instructions are on my GitHub). ✅Proxmox for virtualization ✅ Wazuh as a SIEM to collect logs and create custom ...
LetsDefend Alert Analysis SOC169 - Possible IDOR Attack Detected
Переглядів 1092 місяці тому
In this video I showed how to deal with IDOR attacks and performed alert analysis in LetsDefend.io If you find this video helpful, don't forget to like and subscribe to my channel! Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10 Case Related Links: portswigger.net/web-security/access-control/idor www.abuseipdb.com/check/134.209....
QRadar: How to install WinCollect 10 | Qradar Series (Part 2)
Переглядів 3913 місяці тому
In this video I walkthrough how to install and configure a WinCollect 10 agent on your system. For more information, see the following documentation: www.ibm.com/community/101/qradar/wincollect/ Wincollect CLI Installation Installing WinCollect 10 using the command line www.ibm.com/docs/en/qradar-common?topic=10-installing-wincollect-using-command-line Run the following command: msiexec.exe /qn...
How To Install Qradar Community Edition 7.5 | VMware Workstation | Qradar Series (Part 1)
Переглядів 1,4 тис.3 місяці тому
QRadar Community Edition is a fully-featured free version of QRadar that is low memory, low EPS, and includes a perpetual license. This version is limited to 100 events per second and 5,000 network flows a minute, supports apps, but is based on a smaller footprint for non-enterprise use. This tutorial video explains the process of installing and configuring the IBM QRadar Community Edition v7.5...
TryHackMe | Summit Walkthrough | Malware - Detection Analysis
Переглядів 3624 місяці тому
In this video I walkthrough the room called Summit on tryhackme.com. If you find this video helpful, don't forget to like and subscribe to my channel! #malwareanalysis #cybersecurity #infosec #digitalforensics #tryhackme Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10
Linux Malware Analysis 101 under 10 minutes
Переглядів 2487 місяців тому
In this video, we'll delve into the intriguing world of Linux malware analysis. You'll learn the basics of how to dissect and understand malware on the Linux platform, from recognizing the symptoms of a malware infection to the techniques and tools used for analysis. We'll cover everything from the initial identification of malicious activity, to the in-depth analysis of the malware's functiona...
How To Become A Purple Teamer! C2 Attack and Defend from BlueCapeSecurity
Переглядів 1938 місяців тому
In this video, you will learn how to become a skilled Purple Teamer, mastering the art of both attacking and defending in the cyber security realm. From understanding the tactics and techniques of C2 (Command and Control) attacks to effectively defending against them, this tutorial will provide you with the knowledge and skills needed to excel in the world of cyber security. Whether you are a b...
10 LOLBINS YOU SHOULD KNOW!
Переглядів 1,1 тис.9 місяців тому
In this presentation, We get into the world of living off the land techniques in cybersecurity, also known as LOLBIN. Discover the top 10 LOLBIN techniques that every cybersecurity enthusiast should know to enhance their skills and stay ahead of cyber threats. Stay informed, stay protected. Project Link: lolbas-project.github.io/# If you enjoy this video, like&subscribe to my channel #cybersecu...
Unveiling Ransomware Tactics: A MITRE ATT&CK Analysis of 5 Samples
Переглядів 3329 місяців тому
Description: Dive into the world of cybersecurity as we dissect 5 distinct ransomware samples using the MITRE ATT&CK framework. Discover the intricate methods employed by each sample to infiltrate systems and hold data hostage. Join us as we unravel the tactics, techniques, and procedures utilized by cybercriminals to exploit vulnerabilities and launch devastating attacks. Stay informed, stay p...
Procdot 101 Simplified Visual Analysis
Переглядів 51310 місяців тому
#malware #wireshark #procdot In this video, I cover an awesome utility called ProcDOT. As you are likely aware, Sysinternals’ Process Monitor, also known as Procmon, in combination with PCAP data provides a treasure trove of information that is commonly used in behavioral malware analysis. The problem is, data from those sources is disparate, and typically manual analysis is required to correla...
TryHackMe: Disk Analysis & Autopsy Walkthrough
Переглядів 52610 місяців тому
In this video, we are solving the Disk Analysis & Autopsy room on the TryHackMe platform. tryhackme.com/room/autopsy2ze0 #cybersecurity #tryhackme #autopsy #malware #digitalforensics Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10 CHAPTERS: 00:44 Introduction 02:36 1. Question 03:30 2. Question 04:12 3. Question 05:06 4. Questio...
Basic Reverse Engineering | TryHackMe Basic Malware RE
Переглядів 52810 місяців тому
In this video walkthrough, we covered the basics and fundamentals of reverse engineering using an example room from tryhackme. tryhackme.com/room/basicmalwarere #cybersecurity #tryhackme #ghidra #malware Follow & Connect Linkedin linkedin.com/in/hacksi Medium medium.com/@huseyin.eksi Twitter solarbuster10 CHAPTERS: 00:00 Introduction 00:50 1. Question 01:56 2. Question 03:16 3. Ques...
Uncovering the Emotet Malware: Any.Run Cloud Sandbox Analysis
Переглядів 10611 місяців тому
I show you a malware analysis tool called Any.run in today's video. This is a sandbox service offered online that can provide a safe environment to analyze malware. #malware #anyrun #threatintelligence Links Link to the sample:app.any.run/tasks/6857bf09-504d-4ec8-a1e1-18e88d78c5a0/? Anyrun :any.run/? Anyrun's youtube channel where you can find a lot of valuable videos:ua-cam.com/users/ANYRUN? C...
Phishing Email Analysis with Any.run / Remcos
Переглядів 36811 місяців тому
In this video, I take a deep dive into analyzing a phishing email using Any.run. Phishing emails are a common method used by cybercriminals to steal sensitive information, and it's important to know how to spot and analyze them. I walk through the process of using Any.run to dissect the email and identify any malicious elements, providing valuable insights into how to protect yourself and your ...
Phishing Email Analysis with Any.Run Cloud Sandbox
Переглядів 1 тис.11 місяців тому
Phishing Email Analysis with Any.Run Cloud Sandbox
How to Analyze a Malicious Powershell Script & Fileless Malware
Переглядів 83211 місяців тому
How to Analyze a Malicious Powershell Script & Fileless Malware
How to DECRYPT HTTPS Traffic with Wireshark
Переглядів 2,6 тис.Рік тому
How to DECRYPT HTTPS Traffic with Wireshark
Learning Wireshark - Analyzing a pcap file Ep:2
Переглядів 406Рік тому
Learning Wireshark - Analyzing a pcap file Ep:2
Shellcode Analysis: A Step-by-Step Tutorial with x64 Debugger
Переглядів 388Рік тому
Shellcode Analysis: A Step-by-Step Tutorial with x64 Debugger
TryHackMe Advent of Cyber 2023 Day 1 - Talking with a Language Model!
Переглядів 27Рік тому
TryHackMe Advent of Cyber 2023 Day 1 - Talking with a Language Model!
How to Install Kali Linux&Virtual Box&Windows10 VM
Переглядів 113Рік тому
How to Install Kali Linux&Virtual Box&Windows10 VM
SOC Investigation How to analyze a Malicious Word Document
Переглядів 7312 роки тому
SOC Investigation How to analyze a Malicious Word Document
TryHackMe! Advent of Cyber 2022 Kick-Off Day 1
Переглядів 342 роки тому
TryHackMe! Advent of Cyber 2022 Kick-Off Day 1
Intro to Endpoint Security - Tryhackme Platform
Переглядів 772 роки тому
Intro to Endpoint Security - Tryhackme Platform
Advent of Cyber Day 9: Packet Analysis with Wireshark
Переглядів 732 роки тому
Advent of Cyber Day 9: Packet Analysis with Wireshark
Let’s Defend: Event 62 - SOC128 - Malicious File Upload Attempt
Переглядів 602 роки тому
Let’s Defend: Event 62 - SOC128 - Malicious File Upload Attempt
Investigation of SOC175 CVE-2022-41082 On LetsDefend.io
Переглядів 1322 роки тому
Investigation of SOC175 CVE-2022-41082 On LetsDefend.io
Malware Dynamic Analysis - Trickbot xls
Переглядів 3412 роки тому
Malware Dynamic Analysis - Trickbot xls
Cortex XSOAR SentinelOne Integration Network Quarantine Automation
Переглядів 2262 роки тому
Cortex XSOAR SentinelOne Integration Network Quarantine Automation

КОМЕНТАРІ

  • @Allieduser
    @Allieduser День тому

    no words wow

  • @Allieduser
    @Allieduser День тому

    thanks, very interesting :)

  • @scarops
    @scarops 2 дні тому

    Nice breakdown of LOLBINs (aka LOLBAS). Thank you

  • @leoguy7758
    @leoguy7758 12 днів тому

    can you explain whats the point of this map with all the ongoing attacks all over the world is? You just care about your own infrastructure and not others right?

    • @ihacksi
      @ihacksi 12 днів тому

      @@leoguy7758 Generally in soc environments there are big screens and mostly its used to track how many alerts created daily and other stuff.(Most of the time this data is inaccurate.) I thought a threatmap from radware will look good on my landing page as well. I use that page to redirect other tools in soc.

    • @ihacksi
      @ihacksi 12 днів тому

      Take a look at this ua-cam.com/video/9bfQnzyZ2Zo/v-deo.htmlsi=5o_M4Q6OHXCIBT-i

    • @leoguy7758
      @leoguy7758 12 днів тому

      @@ihacksi ohh ok. thank you

  • @alfredytx145
    @alfredytx145 14 днів тому

    Could it be modified for use in homelab without relying on hetzner?

    • @ihacksi
      @ihacksi 14 днів тому

      Yes, definitely. Reason i am using hetzner is i dont have a homelab that can run 24h straight.

  • @hendriikk
    @hendriikk 14 днів тому

    I have talked to hetzner customer service a while ago and they told me that they suspend services that use honeypots or are serving as honeypots

    • @ihacksi
      @ihacksi 14 днів тому

      I only ran for one month and received no message from Hetzner.

    • @hendriikk
      @hendriikk 14 днів тому

      Yeah it depends on how many abuse messages they get from your services regarding open ports and so on. Mine lastet a few weeks only

  • @gustavolima7049
    @gustavolima7049 16 днів тому

    Impressive! Thanks for the content.

    • @ihacksi
      @ihacksi 15 днів тому

      Thanks for watching! Next goal is build the same or better in AWS.

  • @rafaeldacosta8581
    @rafaeldacosta8581 Місяць тому

    05min - speed run : )

  • @AmsterdamTechno
    @AmsterdamTechno 2 місяці тому

    top

  • @bella_ame
    @bella_ame 2 місяці тому

    Hi, I successfully installed the QRadar VM following part 1 but can't access the dashboard in the browser due to network issues. Could you specify which ports to configure in VMware, besides selecting NAT? The network settings weren’t covered in the QRadar CE instructions. Could you make a video on this or share the details here? I haven't found any videos on UA-cam specifically for installing QRadar CE 7.5 on VMware Workstation. Thanks in advance.

    • @ihacksi
      @ihacksi 2 місяці тому

      @@bella_ame If you set it to nat on vmware workstation and if the qradar services are running properly, you should have access to the web ui by using the IP you selected. There is no other settings for this one.

    • @bella_ame
      @bella_ame 2 місяці тому

      @@ihacksi so we dont need to add any port (like 8444) or the ip we selected to add on vm> network configurations... ???

    • @ihacksi
      @ihacksi 2 місяці тому

      @@bella_ame nop just open the browser and access yourvmip or yourvmip will do the work. There is no specific port runs on 443 on my end

  • @bella_ame
    @bella_ame 2 місяці тому

    I have followed the exact steps but when *power on the vm* facing the following error.... ...... Sat Oct 19 03:16:27 UTC 2024 [create-partitions.sh] ERROR: Disk sda is only 25600 MB, need at least 106496 MB ERROR: The total disk space does not meet the minimum disk space requirement ....... help will be appreciated!

    • @ihacksi
      @ihacksi 2 місяці тому

      @@bella_ame vm disk space is not enough. Recommended settings are at 250 GB. I used 300 in the video. Delete that vm and create a new one with 250

    • @bella_ame
      @bella_ame 2 місяці тому

      ​@@ihacksi Hard Disk? Soory I am a new learner, still confused where to select 250 GB? (video timestamp) ..... I have kept the following: Name: Red Hat Enterprise Linux 8 64-bit Location: D:\IBM Qradar CE Version: Workstation 17.x Operating System: Red Hat Enterprise Linux 8 64-bit Hard Disk: 25 GB, Pre-allocated Memory: 13540 MB Network Adapter: NAT Other Devices: 4 CPU cores, CD/DVD, USB Controller, Printer, Sound Card

    • @ihacksi
      @ihacksi 2 місяці тому

      @@bella_ame As you mentioned Hard disk 25 GB, change that to 250 GB.

    • @bella_ame
      @bella_ame 2 місяці тому

      @@ihacksi If it is set here "Hard Disk: 25 GB, Pre-allocated".... is not it too much?!... like the recommended said 20 GB... as its pre-allocated, takes up all storage of system..

    • @ihacksi
      @ihacksi 2 місяці тому

      @@bella_ame IBM qradar image needs space to build the application. This is not a normal ubuntu/devian installment thats why you will need a lot of space

  • @yunusylc1258
    @yunusylc1258 3 місяці тому

    This is my favorite video, thanks bro

    • @ihacksi
      @ihacksi 3 місяці тому

      Glad you liked it😊

  • @sportyoff
    @sportyoff 3 місяці тому

    thx for guide but where i can see part 2?

    • @ihacksi
      @ihacksi 3 місяці тому

      @@sportyoff I will be recording this weekend hopefully.

    • @sportyoff
      @sportyoff Місяць тому

      @@ihacksi my brother where're you?

  • @souravdebnath2714
    @souravdebnath2714 5 місяців тому

    Thanks for creating this demostration. Looking for more such.

  • @popeadenuga
    @popeadenuga 6 місяців тому

    Why is this video blurry on my end...?

    • @ihacksi
      @ihacksi 6 місяців тому

      Video was captured 720p, if you are using a large display that will look blurry.

  • @amias1533
    @amias1533 7 місяців тому

    The questions are good and the idea is good as well but improve your preattentions

  • @barongo3325
    @barongo3325 9 місяців тому

    Hello, so this questions guide us to see chain of events? Am new to this analysis

    • @ihacksi
      @ihacksi 9 місяців тому

      Yes they do

    • @barongo3325
      @barongo3325 9 місяців тому

      So are this the only questions should I answer in the chain of events?

  • @LokeshKamalakannan
    @LokeshKamalakannan 9 місяців тому

    Simple and understandable explanation....Great video :)

    • @ihacksi
      @ihacksi 9 місяців тому

      Glad you liked it!

    • @ihacksi
      @ihacksi 9 місяців тому

      Glad you liked it! 😊

  • @White-e5n9p
    @White-e5n9p 10 місяців тому

    The content looks excellent. I’m eagerly awaiting your content on #anyrun. 👍🏻

  • @yunusylc1258
    @yunusylc1258 10 місяців тому

    Where is your hat bro ? 😅

    • @ihacksi
      @ihacksi 10 місяців тому

      I wore so many hats over the years, guess I forgot my white hat 😀

    • @yunusylc1258
      @yunusylc1258 10 місяців тому

      @@ihacksi 😅

  • @ihacksi
    @ihacksi 11 місяців тому

    Recent studies on mouse ergonomics suggest that scrolling back up to smash the like button increases wrist strength by 7.3% on average.

  • @White-e5n9p
    @White-e5n9p 11 місяців тому

    Perfect 👌🏻

  • @pamircil
    @pamircil 11 місяців тому

    There are lots of useful information in this video. Thanks for sharing.

  • @yunusylc1258
    @yunusylc1258 11 місяців тому

    Hey bro, what is the name of background sound ?

    • @ihacksi
      @ihacksi 11 місяців тому

      ua-cam.com/users/source7GlsxNI4LVI/shorts?si=JoQS7JqCZMLov8Pu

  • @White-e5n9p
    @White-e5n9p Рік тому

    Very nice 👍🏻

  • @White-e5n9p
    @White-e5n9p Рік тому

    To the point

  • @yunusylc1258
    @yunusylc1258 Рік тому

    Pasaklı laptop 😂

  • @White-e5n9p
    @White-e5n9p Рік тому

    Please keep producing useful content like this 🙏🏻

  • @bobbyrandomguy1489
    @bobbyrandomguy1489 Рік тому

    Good video! Just a tip. Make the text a little bigger. Really hard to read even at 1440p

    • @ihacksi
      @ihacksi Рік тому

      Thanks 🙏 I have a 43 inch monitor since I create it at 4k everything seemed fine to me. 😀. Let me figure out a way.

  • @FrostDeDay
    @FrostDeDay Рік тому

    So, you're just decrypting your own data that you generated?

    • @ihacksi
      @ihacksi Рік тому

      It can be applied to any other example like a malware uses https to send data

  • @usmanomotayo4017
    @usmanomotayo4017 Рік тому

    Hello please if I want to explain the malicious actions in word,how do I do that

    • @ihacksi
      @ihacksi Рік тому

      Hi Usman, if you have a virtual machine to analyze samples you can use olevba tool to identify malicious actions of a word document. You can also record other artifacts with procmon. Google these tools and use 👍

  • @RantiAdemoriyo
    @RantiAdemoriyo Рік тому

    The pcap file has a password to open the file, can you help with the password

    • @ihacksi
      @ihacksi Рік тому

      Hi I remember as password = infected

  • @Klef_Takis
    @Klef_Takis Рік тому

    Appreciate it, quick and to the point.

  • @solomonngare8382
    @solomonngare8382 2 роки тому

    Good video. Thank you

  • @kenandikici
    @kenandikici 2 роки тому

    👏👏👏👏👏👍👍👍👍👍

    • @ihacksi
      @ihacksi 2 роки тому

      Thanks for your positive reply sir, Have a good day

  • @yunusylc1258
    @yunusylc1258 2 роки тому

    I was going to say "adversaries" :))

    • @ihacksi
      @ihacksi 2 роки тому

      I stutter in both languages ENG-TR :)

  • @omergunal4419
    @omergunal4419 2 роки тому

    Helpful!

    • @ihacksi
      @ihacksi 2 роки тому

      Thanks brother :)

  • @yunusylc1258
    @yunusylc1258 2 роки тому

    👍🏻

    • @ihacksi
      @ihacksi 2 роки тому

      Thanks for your support.

  • @yunusylc1258
    @yunusylc1258 2 роки тому

    Your hat is awesome bro :) 👏🏻👏🏻

  • @yunusylc1258
    @yunusylc1258 2 роки тому

    We have a dream! One day !! 👏🏻👏🏻

    • @ihacksi
      @ihacksi 2 роки тому

      Inshallah brother, one day :)

  • @hamzakocibar7409
    @hamzakocibar7409 2 роки тому

    Very very good solution

  • @mckennahaleigh5637
    @mckennahaleigh5637 2 роки тому

    𝓅𝓇𝑜𝓂𝑜𝓈𝓂 😇

  • @ozgur5071
    @ozgur5071 2 роки тому

    👍

  • @yunusylc1258
    @yunusylc1258 2 роки тому

    You are awesome bro !

    • @ihacksi
      @ihacksi 2 роки тому

      It's your reflection 🙂

  • @yunusylc1258
    @yunusylc1258 2 роки тому

    What a nice motivation babayigit !

    • @ihacksi
      @ihacksi 2 роки тому

      Thanks big brother. #TekYolSakal

  • @yunusylc1258
    @yunusylc1258 3 роки тому

    Excellent video! Thanks bro 👍🏻

    • @ihacksi
      @ihacksi 3 роки тому

      It would be better ıf TTnet wouldnt screw my connection 🤕

    • @yunusylc1258
      @yunusylc1258 3 роки тому

      @@ihacksi 🧐

  • @furkanyardim7150
    @furkanyardim7150 3 роки тому

    This video great!!

  • @anthonyhanel
    @anthonyhanel 3 роки тому

    The problem I ran into had to do with the unstable shell that we were both using. This took me a while to figure out. I would recommend watching john Hammond's walkthrough if you're still curious

    • @ihacksi
      @ihacksi 3 роки тому

      Thank you Anthony ,