SOC Investigation: 2.3 - attachment analysis (ANY RUN)
Analyze malicious and suspicious mail Attachment by using AnyRun Sand Box.
AnyRun: https://any.run/
CyberChef: https://gchq.github.io/CyberChef/
Видео SOC Investigation: 2.3 - attachment analysis (ANY RUN) канала Mostafa Yahia
AnyRun: https://any.run/
CyberChef: https://gchq.github.io/CyberChef/
Видео SOC Investigation: 2.3 - attachment analysis (ANY RUN) канала Mostafa Yahia
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
DFIR (Windows Forensics) Course: Image Mounting (FTK Imager)Cyber Security Introduction: 13- SandboxSOC Investigation: 4 - Firewall logs AnalysisCyber Security Introduction: 5- HashingCyber Security Introduction: 15- AntiVirusSOC Investigation: 3.3 - Microsoft Events Log Analysis: Windows Account & Group Management EventsDFIR (Windows Forensics) Course: Alternate data streams (ADS)DFIR (Windows Forensics) Course: Analyzing the SAM HiveSOC Investigation: 2.4 - Email Header Analysis, Email Flow and what is the SPF & DKIM.DFIR (Windows Forensics) Course: Data RecoveryCyber Security Introduction: 9- Web Application Firewall (WAF)SOC Investigation: 7- IPS/IDS Alerts InvestigationDFIR (Windows Forensics) Course: Data AcquisitionDFIR (Windows Forensics) Course: Windows NTFS TimestampsCyber Security Introduction: 11- Next Generation Firewall (NGFW)SOC Investigation: 9- Remote Login From Different Geolocation (IB, OWA, VPN)Incident Handling\Response PhasesDFIR (Windows Forensics) Course: Introduction to Windows RegistryDFIR (Windows Forensics) Course: The difference between Digital Forensics and Incident ResponseSOC Investigation: 3.2 - Microsoft Events Log Analysis: Object, Scheduled tasks and Process Creation