The Truth About Phishing - Tools, Tactics and Techniques to Analyse Phishing & Protect Your Privacy
Want to know why Phishing attacks are so successful? Want to know if an email is fake or legitimate? Do you want to investigate phishing infrastructure and find out who's behind the attack? In this video I have you covered.
👇 ⭐ VIDEO SPONSOR ⭐ 👇
=======================
This video is sponsored by Malwarebytes Privacy; a super-quick, super-secure VPN which will protect your privacy and prevent unauthorised tracking. If you care about your privacy you should absolutely be using a VPN.
Malwarebytes Privacy is highly secure, super-fast and extremely cost effective. Also, check out the bundle you can get with Malwarebytes Device Security - where you can protect up to 5 of your devices from phishing, ransomware and malware.
Check out this link to learn more about how you can protect your Privacy online:
https://www.malwarebytes.com/for-home/
NOTE
=====
I reported the Phishing content referenced in this video to both Dreamhost and Paypal; as a result the content has now been taken down. If you identify a Phishing website, I encourage you to report it where possible.
SHORTCUTS
==========
00:00 - Introduction
00:55 - Sponsored Content from Malwarebytes Privacy
03:24 - Identifying malicious emails
04:53 - BIMI logos
07:52 - DMARC, SPF and DKIM
10:25 - Sending spoofed emails
10:54 - Email header analysis
12:26 - Paypal phishing website analysis
14:11 - Tools for analysing malicious content
15:22 - Finding red flags
18:30 - Finding the phishing source code
20:04 - Phishing code analysis
20:50 - Identifying victims from log files
24:50 - Identifying the adversary
26:12 - How phishing websites evade security controls
30:43 - More victim logs
32:10 - Summary & Thanks to Malwarebytes
FOLLOW
=======
You can join in the conversation by following me at https://twitter.com/cybercdh
THANKS
=======
If you LIKED this video, please hit the THUMBS UP.
If you LOVED it, please SUBSCRIBE!
Many thanks for watching, it means a lot.
Peace out.
✌️
@cybercdh
Видео The Truth About Phishing - Tools, Tactics and Techniques to Analyse Phishing & Protect Your Privacy канала cybercdh
👇 ⭐ VIDEO SPONSOR ⭐ 👇
=======================
This video is sponsored by Malwarebytes Privacy; a super-quick, super-secure VPN which will protect your privacy and prevent unauthorised tracking. If you care about your privacy you should absolutely be using a VPN.
Malwarebytes Privacy is highly secure, super-fast and extremely cost effective. Also, check out the bundle you can get with Malwarebytes Device Security - where you can protect up to 5 of your devices from phishing, ransomware and malware.
Check out this link to learn more about how you can protect your Privacy online:
https://www.malwarebytes.com/for-home/
NOTE
=====
I reported the Phishing content referenced in this video to both Dreamhost and Paypal; as a result the content has now been taken down. If you identify a Phishing website, I encourage you to report it where possible.
SHORTCUTS
==========
00:00 - Introduction
00:55 - Sponsored Content from Malwarebytes Privacy
03:24 - Identifying malicious emails
04:53 - BIMI logos
07:52 - DMARC, SPF and DKIM
10:25 - Sending spoofed emails
10:54 - Email header analysis
12:26 - Paypal phishing website analysis
14:11 - Tools for analysing malicious content
15:22 - Finding red flags
18:30 - Finding the phishing source code
20:04 - Phishing code analysis
20:50 - Identifying victims from log files
24:50 - Identifying the adversary
26:12 - How phishing websites evade security controls
30:43 - More victim logs
32:10 - Summary & Thanks to Malwarebytes
FOLLOW
=======
You can join in the conversation by following me at https://twitter.com/cybercdh
THANKS
=======
If you LIKED this video, please hit the THUMBS UP.
If you LOVED it, please SUBSCRIBE!
Many thanks for watching, it means a lot.
Peace out.
✌️
@cybercdh
Видео The Truth About Phishing - Tools, Tactics and Techniques to Analyse Phishing & Protect Your Privacy канала cybercdh
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Remcos Config - Using RC4 to Get Command & Control from CyberChefSUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShellY2K22 - Why 2022 Broke EmailCrack The BAT - Identifying Compression, Packers & Googling for IOCsWannaCry Ransomware - Revisited. Behavioural and Static Analysis TechniquesCVE-2017-8570 - Dynamic analysis of Exploit used in Powerpoint to deliver KeyBase InfoStealerLive Stream - Malware Analysis Tools Tactics & TechniquesAdylkuzz CryptoMiner - A quick behavioural analysisCyber Defender REACTS to THEFT of Microsoft Exchange Server ZERO DAYS used by HAFNIUMJaff Ransomware - A quick technical analysisExtracting encrypted contents from Kronos Banking TrojanUsing WhatsApp for Malware PersistenceFive Awesome Tools to perform Behavioural Analysis of MalwareEmotet is DeadThreat Hunting with Inquest LabsWrangle with Hangul - Analysis of a malicious hwp documentOlympic Destroyer - Quick behavioural Analysis of this Wiper MalwareAnalysing Obfuscated VBA - Extracting indicators from a Trickbot downloaderBashing LOLSnif - Defeating Anti-Analysis Techniques to get real IOCsExtract Shellcode from Fileless Malware like a ProOvercome Self-Defending Malware - Tools, Techniques and Lab Setup