Finishing touch message is awesome. Murali master garu . U have very great keen understanding. Wistel bowler topic u got means u know everything of company process
I just happened to stumble upon this channel. Wow super content. More thrilling than a movie. Amazing , told Atleast 10 people to subscribe this channel
The content is great, was waiting for this kind of content in telugu. Happy to see you guys bringing it to us. Murali garu mentioned that there will be a separate episode on Android security, it would be helpful for many people. Thanks for your efforts.
Sir, Appreciate your efforts to bring different shades of cyber crime. Truly needed subject in an era of virtual reality. Besides , I am impressed by your WRIST WATCH collection. Kindly do share details of watches in the description which doesnt impact the video content, hope I didnt trouble asking out of the topic.
Must appreciate your efforts on educating us, till now my perception about cyber security is like stop some hacker from attacks, never imagined the various types of crimes that takes place using the technology, kudos to your experience and knowledge!!!, i just recollected the typical Neraalu - Ghoralu TV program, all these episodes you created must be shot and telecasted like CID!
Very very useful content… please bring more and more investigation case studies and share information how to avoid such trap situations knowingly or unknowingly .
32:21 hey murali master, i agree ur point but without location access,camera access etc, G-Pay,Paytm other apps will not work for u, so how can we skip this problems..? and now a days we are habituated for online transactions and not carrying cash.!😅
37:30 Breaking Privacy: FBI managed to get into the San Bernardino shooter’s iPhone, which Apple denied unlocking, was eventually hacked by an Australian firm starting with a Lightning port exploit. So in such situations what's ethical and legal ?
If a specific item is of high value in a criminal investigation then public good will prevail over an an individuals rights, having said that Apple was resisting because they want to keep the perception that they will not compromise on security in any situation - which is one of their USP.
I started watching this channel from last week. Till now viewed 3 videos, this is the 4th video and I am stated getting bored. You guys are sharing really good info I really appreciate your effort & THANKS for that. But feels like lot of repetition of info from 3rd video itself. As of now I am subscribed to this channel. And sorry to say this, if there is no new info you gonna share and just repeat like this, I may unsubscribe. Hope you guys will come up with some new info in each video to keep a tap you folks. Thanks again for Cyber awareness to the society, which really needed for Telugu people...!!!
Thanks much for your feedback - we will arrive to keep it interesting, but do keep in mind real life incidents can be boring, we cannot manufacture stories. Also see the news episodes to keep yourself abreast.
I hope this message finds you well. My name is Kunal Jaiswal, and I recently lost over Rs 40 Lakhs in an unauthorized transaction at a public sector bank. Despite over 40 days and numerous attempts to get a response from the bank and RBI, I've received no help. I believe my case can serve as a crucial lesson for your audience on banking security. Your platform could help bring attention to this issue and educate others on protecting their funds. I'm willing to share detailed information and documentation. Thank you for considering my request.
Sir, What if the insider or a TA just vanised all logs or the data ( or atleast crucial data to prove Guilty) required for audit or analysis. ||| ❤ Love and Respect from a Blue Teamer
It is a possibility and in the recent phone tapping incident the accused apparently did the same, first of all it's a crime to tamper with evidence, so law will take serious view of this act, also as a rule logging should be at a location which reasonable tremote with read only access otherwise it's a design failure.
@@MuraliMastaru for doing this kind of activity you would require business kind of visa right, if you already have this visa prior to the case investigation then it is absolute make sense. Btwn your video are good
Hello sir, I had a samsung galaxy a50 mobile, the motherboard of phone got damaged and the phone unable to boot only company logo is visible if we power on it. The phone has some data which is emotionally important as it has some memories of father who were nomore. Noone either company service or any other moblie repair shops are not ready to retrive the data from the phone. I'm a ECE graduate from hyderabad and in college my optional course was cyber security. From these knowledge the ways i know to retrive data are 1. Physically removing memory modules from the motherboard of phone gain data. Data retrieval companies are charging very high like 50k to this work respective of size of data and ssd or disk. 2. To create duplicate image of data using softwares - (used in computer forensics ) they are very expensive and only used by major organizations like hyderabad cybrecrime etc.. Sir, can you suggest any kind of software that is free or less expensive and can able to retrive data from locked, semi dead, or completely dead phone.
Andhra lo jagan meeda cheyyandi sir janalaku vupayogam India lo banks audit before noteban and after note ban serious ga chesthe manaku future lo avasaramina finance planning chesukovachu
@@MuraliMastaru Hi sir, happy to hear a reply from you. Content is very very informative, The kind of real time awareness that your creating is very inspiring. Please keep continue
Here from raw talks with vk…Eppati varaku nen me channel chudledhu sir🥹, Great content i have one thing to ask you sir..” nen x lo tweet chesa icici bank ki mention chesi oka issue gurinchi nen tweet chesina 20 min lo okaru cal chesi issue enti ani aduguthunadu akkda id mention chesa nuv nijnga icici bank aithe issue teliyali kadhara ante cut chesadu” oka tweet tho vadiki number ela telisindhii 🥹
Sir anni solve aina cases kakunda, tell about the case which you couldn't able to solve
Adhi one night job kadhu kadha bro, some cases still would be in progress and not sure about accuracy.
This will be my next question to Murali😊
Arey Vemula, nijam cheppu.. evarriki dorakkunda edo pedda crime plan chesaav kada? 😂
@@jignesh.talasila murali mavayyani hospital lo jarigindi Or hospital related question adugu anna..! !!
@@BeastMr947 target peti droikindu..dorkaunda tricks kavali ayaniki 😂
Ending super
Finishing touch message is awesome. Murali master garu . U have very great keen understanding. Wistel bowler topic u got means u know everything of company process
Trigger-identification-reconnaissance-collection-process-interview-review-analysis-report
I just happened to stumble upon this channel. Wow super content. More thrilling than a movie. Amazing , told Atleast 10 people to subscribe this channel
very informative content.. finishing video was super from Murali mastaaru..
Thanks for giving abrevations and information and flow chart below
The content is great, was waiting for this kind of content in telugu. Happy to see you guys bringing it to us. Murali garu mentioned that there will be a separate episode on Android security, it would be helpful for many people. Thanks for your efforts.
Last punch అదుర్స్ మాస్టారు... స్లాంగ్ సంపేసారు గా❤
Sir, Appreciate your efforts to bring different shades of cyber crime. Truly needed subject in an era of virtual reality. Besides , I am impressed by your WRIST WATCH collection. Kindly do share details of watches in the description which doesnt impact the video content, hope I didnt trouble asking out of the topic.
Hello sir
The overall episode is one level and the exit note was super crazy 😂😂
Must appreciate your efforts on educating us, till now my perception about cyber security is like stop some hacker from attacks, never imagined the various types of crimes that takes place using the technology, kudos to your experience and knowledge!!!, i just recollected the typical Neraalu - Ghoralu TV program, all these episodes you created must be shot and telecasted like CID!
When I saw the first interview i became a big fan of u sir
Nenu nerchukunna catia gurinchi entha information icharu sir great😀👏🏻
OMG - never thought a CATIA person will watch this 🙏
This is a great and informative podcast. I really enjoyed listening to it.
Love you Content, Love from New Zealand... Keep Producing more Content... Very good job... ❤
Very very useful content… please bring more and more investigation case studies and share information how to avoid such trap situations knowingly or unknowingly .
Keep doing these videos we will always support you❤
You are very valuable Information for these digital World , keep Going....Interesting podcast 👍
Amazing work by the team behind investigations, Kudos 👏🎉
Content is useful and request you to please do more such.
Yes sir....app security much needed
Amazing and mind blowing
U r podcost made me clear vision on my work profile
If the issue is solved, the satisfaction is superb. Also, what is the way to get into this job role?
Plz do video Android security
Sir meeru oka adhbutham👍
Super analysis sir
Personal data leak avakunda Small tips chepandi next video lo like Paytm, Credit card, UPI, How to turn off this kind of Details please 🙏🙏
32:21 hey murali master, i agree ur point but without location access,camera access etc, G-Pay,Paytm other apps will not work for u, so how can we skip this problems..? and now a days we are habituated for online transactions and not carrying cash.!😅
Let it access the location only when app is active and don't allow access to SMS
Anna weekly one episode upload chey Anna
Please upload every new episode weekly once if possible...Thanks
Adiripoindi web series chusinatte undhi 😂❤
please make those android security & app security content video..
Good content
Hai sir ❤❤ super
Eagerly waiting for Android security and app permissions management podcast. Please make it sir... It helps everyone
Pls make a episode on the security of mobile phones
Great information
37:30 Breaking Privacy: FBI managed to get into the San Bernardino shooter’s iPhone, which Apple denied unlocking, was eventually hacked by an Australian firm starting with a Lightning port exploit. So in such situations what's ethical and legal ?
If a specific item is of high value in a criminal investigation then public good will prevail over an an individuals rights, having said that Apple was resisting because they want to keep the perception that they will not compromise on security in any situation - which is one of their USP.
Like to know more abt different case studies please
Alternative name can be Risk and control team.
very interesting! sir.
Murali gari watch is good what is the name of the watch you are weraring?
Hello sir,
May I know your watch ⌚ name or model
I asked same
I started watching this channel from last week.
Till now viewed 3 videos, this is the 4th video and I am stated getting bored.
You guys are sharing really good info I really appreciate your effort & THANKS for that.
But feels like lot of repetition of info from 3rd video itself.
As of now I am subscribed to this channel. And sorry to say this, if there is no new info you gonna share and just repeat like this, I may unsubscribe.
Hope you guys will come up with some new info in each video to keep a tap you folks.
Thanks again for Cyber awareness to the society, which really needed for Telugu people...!!!
Thanks much for your feedback - we will arrive to keep it interesting, but do keep in mind real life incidents can be boring, we cannot manufacture stories. Also see the news episodes to keep yourself abreast.
Who fare the expenses cost during case investigation
Can your podcasts are veryy good....but please increase the duration next time
Hello sir, instead of parts of the video. Make it one full video which is beginning to conclusions. Thank you
Sir. Onpassive froud gurinchi చెప్పండి సార్
Murali garu namaskar excellent presentation. please share your firm name to connect...thanks
Please look me up in LinkedIn or ping me on Insta
nakku ssh key gen kakunda enka amee ardam kaleydhu sir
Can you please have a session where audience can ask you all questions
I hope this message finds you well. My name is Kunal Jaiswal, and I recently lost over Rs 40 Lakhs in an unauthorized transaction at a public sector bank. Despite over 40 days and numerous attempts to get a response from the bank and RBI, I've received no help. I believe my case can serve as a crucial lesson for your audience on banking security. Your platform could help bring attention to this issue and educate others on protecting their funds. I'm willing to share detailed information and documentation. Thank you for considering my request.
Kunal - sorry to hear this, we will consider using your experience.
Sir meru Sunisth ne minchi unnru. Prathi ragalo prathiba chupisthu. Sunisth meru Friends haa
38:36 Mastaru adi meere na?
😂 Only for the exit note murali garu commenting.....Great podcast
Can you tell us how to get into this kind of jobs.
In Internal Audit intention is everything is right
In investigation intention is everything worng.
Sir, What if the insider or a TA just vanised all logs or the data ( or atleast crucial data to prove Guilty) required for audit or analysis. ||| ❤ Love and Respect from a Blue Teamer
It is a possibility and in the recent phone tapping incident the accused apparently did the same, first of all it's a crime to tamper with evidence, so law will take serious view of this act, also as a rule logging should be at a location which reasonable tremote with read only access otherwise it's a design failure.
Next day London how come ?? Visa required right
Why do you assume that I didn't have a VISA?
@@MuraliMastaru for doing this kind of activity you would require business kind of visa right, if you already have this visa prior to the case investigation then it is absolute make sense.
Btwn your video are good
Unfortunately.......the SINGULARITY is nearer....rapidly and unpredictable.....
Hi MURALI gaaru
Can you make video on EVM hacking hot topic of the time?
Hello sir,
I had a samsung galaxy a50 mobile, the motherboard of phone got damaged and the phone unable to boot only company logo is visible if we power on it. The phone has some data which is emotionally important as it has some memories of father who were nomore. Noone either company service or any other moblie repair shops are not ready to retrive the data from the phone.
I'm a ECE graduate from hyderabad and in college my optional course was cyber security. From these knowledge the ways i know to retrive data are
1. Physically removing memory modules from the motherboard of phone gain data.
Data retrieval companies are charging very high like 50k to this work respective of size of data and ssd or disk.
2. To create duplicate image of data using softwares - (used in computer forensics ) they are very expensive and only used by major organizations like hyderabad cybrecrime etc..
Sir, can you suggest any kind of software that is free or less expensive and can able to retrive data from locked, semi dead, or completely dead phone.
Will try and locate some info for you
@@MuraliMastaru thank you sir
Please ping me on Insta
@@MuraliMastaru ok sir done
@@MuraliMastarusir , didn't got any info 😢
Sir some one is blackmailing me in WhatsApp with my personal photos where do i have to complain
Cybercrime
What murali sir watch..?
It is called Fiduciary liability.
Andhra lo jagan meeda cheyyandi sir janalaku vupayogam
India lo banks audit before noteban and after note ban serious ga chesthe manaku future lo avasaramina finance planning chesukovachu
Who is Murali? Ane question ki answer cheppandi sir.
I mean your profession
Please Google - I did not fall from the sky.
Went through the halfway of interview ,to only realise that im far behind
100th comment Nadhe...😂
Sir it was very informative.
Super content Sir.👌
Mastaru, why are you disclosing your identity?
Have you stopped working, or is your team still in an active state?
I am no RAW agent - there is nothing to hide, but only to protect my clients and data
@@MuraliMastaru Hi sir, happy to hear a reply from you. Content is very very informative,
The kind of real time awareness that your creating is very inspiring. Please keep continue
What ever you here.., still going strong in different places perhaps I’m using
Please fill in the blanks - so that we can see your point
Sorry to ask this, if a criminal / criminal minded person gains the knowledge from this what's your action.
This and much worse existed in English for decades in the wild.of Internet, remember most hackers do not have a certification.
😂@@MuraliMastaru
Hi wanna meet u both people
one and two
Trigger veera
Constable cadreni vadu veedu anadam nacha ledu mee meeda vunna respect poyindi..
Nuvvu investigation vadilesi full time acting chey anna 😂
Evaru swamy ena
38:35 Murali mastar sarcasm 🎉😅is more hilarious 😂
🫡🫡
Here from raw talks with vk…Eppati varaku nen me channel chudledhu sir🥹, Great content i have one thing to ask you sir..” nen x lo tweet chesa icici bank ki mention chesi oka issue gurinchi nen tweet chesina 20 min lo okaru cal chesi issue enti ani aduguthunadu akkda id mention chesa nuv nijnga icici bank aithe issue teliyali kadhara ante cut chesadu” oka tweet tho vadiki number ela telisindhii 🥹
OSINT or other place where your info is pilfered for other unrelated reaons