Visual Analysis with ProcDOT

Поділитися
Вставка

КОМЕНТАРІ • 18

  • @Apple0sx7
    @Apple0sx7 5 років тому +1

    Fantastic video! Looking forward to additional malware analysis videos!

  • @BrittonMittens
    @BrittonMittens 2 роки тому +1

    Great overview, thanks for your effort!

  • @vesnx
    @vesnx 6 років тому +5

    Actually not just malware., it's also interesting to see what my own software is doing. I know what it's supposed to be doing but always nice to make sure the actions reflect the intended workflow especially when it comes to race conditions in multi-threaded applications. Good video, nice tool

    • @13Cubed
      @13Cubed  6 років тому +1

      Yes, in fact we use this for troubleshooting often.

  • @TammyDenseDdank5658
    @TammyDenseDdank5658 Рік тому

    Excellent and amazing tutorial guy!

  • @joshuampere4327
    @joshuampere4327 5 років тому +1

    Please do a video on an additional video with procdot on a beaconing malware

  • @youtubeenjoyer194
    @youtubeenjoyer194 5 місяців тому

    I hate looking at ProcDOT graph. It's overwhelming. Great videos by the way, this reduces my hate on ProcDOT 😂

  • @hassanshehata9626
    @hassanshehata9626 3 роки тому +1

    thanks for the efforts

  • @MrWrist7m
    @MrWrist7m 6 років тому +1

    Thanks for sharing useful knowledge. Would it be possible for you to sharing on how to setup Cuckoo in step by step. Thank you in advance.

  • @nicolaslaborie5015
    @nicolaslaborie5015 6 років тому

    I agree with Peter Pann, and I also want to thank you so much.
    I'll try this right now! Procmon (for files, registry and processor dumps) + Wireshark (for internet dumps) + ProcDOT (for visualizing) looks amazing!
    I was starting to get crazy and wanting to download Cuckoo Sandbox to check how and why some errors spawn on our office apps or just in W10 in general :) but some of our errors can't be reproduced. I'm so stoked lol ! Thx again for this

    • @nicolaslaborie5015
      @nicolaslaborie5015 6 років тому

      Update to myself: Tried it and it's indeed awesome.
      But don't try it with a ransomware (on a virtual machine of course).
      Never ended with the graph due to all the files getting encrypted seen in procmon... :)
      Thanks again

  • @emmanuelsheshi961
    @emmanuelsheshi961 13 днів тому

    thanks so much

  • @markmccurdy2955
    @markmccurdy2955 6 років тому +1

    I'd love to see this work for volatility captured network and process data. It may exist, but you don't know what you don't know.

  • @313jacob
    @313jacob Рік тому

    I followed all the instructions and no matter what I do, I always get: "Procmon has an unknown format!" How do I solve this?

    • @13Cubed
      @13Cubed  Рік тому

      This is actually mentioned here: www.procdot.com/faqs.htm. Refer to readme.txt and re-check your procmon config. I bet it's something really small that needs to be changed.

  • @rohitnarwal8284
    @rohitnarwal8284 6 років тому

    it would be better if you show something for linux
    still enjoyed it....

    • @13Cubed
      @13Cubed  6 років тому

      It's coming. I plan to cover some Linux forensics-related topics in upcoming episodes.

    • @rohitnarwal8284
      @rohitnarwal8284 6 років тому

      @@13Cubed thanks bruh....