Understanding Windows Core Processes For Cyber Security Analysts | TryHackMe

Поділитися
Вставка
  • Опубліковано 25 тра 2021
  • In this video walkthrough, we covered windows core processes and demonstrated what is a normal behaviour for a windows process to easily spot malwares
    #windows
    #tryhackme
    ----
    Patreon
    www.patreon.com/motasemhamdan...
    Backup channel
    / @hacknotesbackup
    My Movie channel:
    / @motasemhamdanhacknotes
    ------------
    Receive video documentation
    / @motasemhamdan
    ----
    Do you need private cybersecurity training? sign up here
    motasem-notes.net/cybersecuri...
    --
    Twitter
    / manmotasem
    LinkedIn
    / motasem-hamdan-7673289b
    Instagram
    / mo.vultu
    Facebook
    / motasemhamdantty

КОМЕНТАРІ • 14

  • @memepasmal77
    @memepasmal77 Місяць тому +1

    Thank you for the great job.

  • @manafhousin9973
    @manafhousin9973 5 місяців тому +1

    Thank you MAN!

  • @quarkdaniel3354
    @quarkdaniel3354 3 роки тому +2

    thx for all the videos

  • @abdullahb.9746
    @abdullahb.9746 Рік тому +1

    thank you bro

  • @alisahin3166
    @alisahin3166 11 місяців тому +1

    Why is it stating, that the parent of csrss.exe and wininnit.exe is a "non-existent process", while smss.exe is existing? Can some please explain?

    • @cur53d34
      @cur53d34 10 місяців тому +1

      from what i understood, smss.exe exists just for some time, does what it should do, then terminates itself, and I guess by the time the child processes are called, smss.exe have already terminated itself. You can see that in Task 4 in the appropriate room in THM

    • @alisahin3166
      @alisahin3166 10 місяців тому

      @@cur53d34 Yea, that was also my understanding at that time. But actually there are 3 smss processes - 1 master smss process, which does not terminate itself and then two temporary "child" processes of smss, that are also called smss (but differentiated in session 0 & 1), which terminate themselfes after creating their child processes, which I mentioned in my first post.
      Edit: Here is a good explanation: ua-cam.com/video/pmy2_tCT6Sk/v-deo.html

  • @ronakrawal8325
    @ronakrawal8325 3 роки тому +2

    I have a question. can we sniff phone calls and SMS if yes then how?

    • @islandpenguin5056
      @islandpenguin5056 3 роки тому +8

      How big is your nose?

    • @faizanarif2610
      @faizanarif2610 3 роки тому +3

      First you buy Hardware and Install Scripts into it, With these functionality VLH/MSC (Visitor Location Register/ Mobile Switching Center) In Simple words you would Create A complete Mobile Tower with all the functionality in it Just small in size. You should be in close range with your experiment subject (range depend on how expensive can you get). Once you have all the details on the screen. Grab Blank SIM and put it in SIM Card Reader. that's ALL. Its worth the shot if you'd also prepare yourself for jail food.

    • @itsm3dud39
      @itsm3dud39 2 роки тому

      @@faizanarif2610 if you can hack the particular company then no need of making tower

    • @TalibFaridy11
      @TalibFaridy11 Рік тому

      @@faizanarif2610 you can tap voice over internet protocol

  • @babayaga8663
    @babayaga8663 Рік тому

    what if command line is N/A