Satheesh Threat Researcher
Satheesh Threat Researcher
  • 24
  • 48 231

วีดีโอ

Digital Certificates
มุมมอง 7353 ปีที่แล้ว
A digital certificate is a file or electronic password that proves the authenticity of a device, server, or user through the use of cryptography and the public key infrastructure (PKI). Digital certificate authentication helps organizations ensure that only trusted devices and users can connect to their networks.
Security through Network Technologies and Design Elements
มุมมอง 2133 ปีที่แล้ว
Network security devices Network technologies enhance security Secure network design elements
Securing the OS and Host
มุมมอง 1363 ปีที่แล้ว
List the steps for securing a host computer. Define application security. Explain how to secure data.
Malware and Social Engineering Attacks
มุมมอง 6983 ปีที่แล้ว
Video1: Malware Define malware List the types of malware Identify payloads of malware Next video demonstrates Social Engineering Attacks.
Transport Layer - Port Numbers
มุมมอง 2.6K3 ปีที่แล้ว
Transport Layer - Port Numbers
Transport Layer - Process to Process Communication - Intro
มุมมอง 2.2K3 ปีที่แล้ว
Transport Layer - Process to Process Communication - Intro
Controlled Access Methods
มุมมอง 1323 ปีที่แล้ว
Controlled Access Methods
Why Semantic web?
มุมมอง 544 ปีที่แล้ว
Conventional Web, Mashup Websites and Semantic web Web 2.0 Semantic Web = Web 3.0
Degree Centrality, Closeness Centrality, Betweenness Centrality
มุมมอง 22K4 ปีที่แล้ว
Degree Centrality, Closeness Centrality, Betweenness Centrality
Social Networking - Cohesive SubGroup - Cliques, Clans, Clubs, Plex
มุมมอง 4.7K4 ปีที่แล้ว
Social Networking - Cohesive SubGroup - Cliques, Clans, Clubs, Plex
Dynamic Analysis - Demo
มุมมอง 6064 ปีที่แล้ว
RegShot: regshot.en.uptodown.com/windows Autorun: docs.microsoft.com/en-us/sysinternals/downloads/autoruns Wireshark: www.wireshark.org/download.html Notepad : notepad-plus-plus.org/downloads/
Dynamic Analysis - Module-1
มุมมอง 2574 ปีที่แล้ว
System Changes System Integrity Monitoring
Malware analysis: In context of PE Header - Demo
มุมมอง 6244 ปีที่แล้ว
PE Header Investigation PEStudio www.winitor.com/
Malware Analysis - PE Header
มุมมอง 3.3K4 ปีที่แล้ว
PE Header File Header Optional header PE Sections Import Address Table (IAT) Import Address Table (IAT) - Ordinals Import Address Table (IAT) - APIs Resources
Static Analysis - String Analysis - Module-2 Encoded String Analysis in malware file
มุมมอง 4304 ปีที่แล้ว
Static Analysis - String Analysis - Module-2 Encoded String Analysis in malware file
Embedded / Hidden string analysis - Module-1
มุมมอง 5274 ปีที่แล้ว
Embedded / Hidden string analysis - Module-1
Static Analysis - Module - 3
มุมมอง 3144 ปีที่แล้ว
Static Analysis - Module - 3
Static Analysis - Module - 2
มุมมอง 2674 ปีที่แล้ว
Static Analysis - Module - 2
Static Analysis - Module - 1
มุมมอง 5334 ปีที่แล้ว
Static Analysis - Module - 1
Configuring the Sandbox with Malware Analysis Tools - Module -2
มุมมอง 4364 ปีที่แล้ว
Configuring the Sandbox with Malware Analysis Tools - Module -2
Configuring the Sandbox with Malware Analysis Tools - Module-1
มุมมอง 4924 ปีที่แล้ว
Configuring the Sandbox with Malware Analysis Tools - Module-1
Malicious Traffic Analysis using Wireshark and Indication of Compromise (IOC)
มุมมอง 6K4 ปีที่แล้ว
Malicious Traffic Analysis using Wireshark and Indication of Compromise (IOC)
Learning Studio
มุมมอง 2465 ปีที่แล้ว
Learning Studio

ความคิดเห็น

  • @kshitijadupare8633
    @kshitijadupare8633 10 วันที่ผ่านมา

    Great work sir! Thank you for this explanation

  • @rohit_-xyz3272
    @rohit_-xyz3272 8 หลายเดือนก่อน

    Sir file not found error 😢

  • @RubeIl
    @RubeIl ปีที่แล้ว

    Very bad

  • @harshalidevi6718
    @harshalidevi6718 ปีที่แล้ว

    sir,can you please share the playlist for transport layer?

  • @ebrukocakaya8367
    @ebrukocakaya8367 ปีที่แล้ว

    You took slides from other videos & creators Betweenness centrality: th-cam.com/video/ptqt2zr9ZRE/w-d-xo.html&pp=ygUUY2xvc2VuZXNzIGNlbnRyYWxpdHk%3D Closeness centrality: th-cam.com/video/0aqvVbTyEmc/w-d-xo.html&pp=ygUUY2xvc2VuZXNzIGNlbnRyYWxpdHk%3D You should at least give credit, otherwise it can be stealing intellectual property.

  • @Akashsingh-if6mc
    @Akashsingh-if6mc ปีที่แล้ว

    very interesting and informative video thanks

  • @akshaykrishna2956
    @akshaykrishna2956 ปีที่แล้ว

    no clarity in explanation sir .........pls try to write notes and explain

  • @npavan888
    @npavan888 ปีที่แล้ว

    Thanks for the session sir

  • @mclarenm1
    @mclarenm1 ปีที่แล้ว

    there are lot of mistakes....please don't teach wrong stuffs

  • @geekmuralin
    @geekmuralin 2 ปีที่แล้ว

    Thank you sir

  • @deepisekar8409
    @deepisekar8409 2 ปีที่แล้ว

    Hi sir

  • @Ayush-qi2cd
    @Ayush-qi2cd 2 ปีที่แล้ว

    sir i had choose cyber security as specialization in my btech but as lack of good professors i can not get knowledge in my skill so can u suggest me some tips that help me to enhance my skills .

  • @igu642
    @igu642 2 ปีที่แล้ว

    nice

  • @theandroid1031
    @theandroid1031 2 ปีที่แล้ว

    Nice explanation and easy way to understand

  • @chhokersukhvinder
    @chhokersukhvinder 2 ปีที่แล้ว

    very good thanks for effort

  • @hemalathanalli6042
    @hemalathanalli6042 2 ปีที่แล้ว

    Tq sir for good explanation 👍

  • @abhishekmishra2694
    @abhishekmishra2694 2 ปีที่แล้ว

    Great one buddy !

  • @benyang6546
    @benyang6546 2 ปีที่แล้ว

    Very good and funny videos bring a great sense of entertainment!

  • @gowthamr3594
    @gowthamr3594 3 ปีที่แล้ว

    Hello Brother, I am following you for couple of months. I have few doubts in Malware Analysis. Could you please drop your email address ??

    • @satheeshthreatresearcher
      @satheeshthreatresearcher 3 ปีที่แล้ว

      Thank you bro.. post your mail id.. Will contact you..

    • @gowthamr3594
      @gowthamr3594 3 ปีที่แล้ว

      @@satheeshthreatresearcher sure bro.. attached the address. google removing the details if given in full form. Hence jumbled it... gowtham.r2127xxxgxmxaxil

    • @gowthamr3594
      @gowthamr3594 3 ปีที่แล้ว

      Bro, available there? Will you please reach me?

  • @avalarmathy
    @avalarmathy 3 ปีที่แล้ว

    Clear explanation about malware and its types...useful information..

  • @santoshtamboli
    @santoshtamboli 3 ปีที่แล้ว

    Sir If file is benign then what will be the subsystem? Whether it is GUI or any other. What is the use of compiled timestamp in malware analysis? Because it just give time information. Is it necessary to do malware analysis in Virtual machine. Or we can do in our normal OS. Thanx

  • @avalarmathy
    @avalarmathy 3 ปีที่แล้ว

    Perfect explanation with examples sir

  • @DP-gr3jf
    @DP-gr3jf 3 ปีที่แล้ว

    It must be a class video... As per seeing the comments. But the content..the teaching approach is really amazing.. ✌🏼 felt better with the concept. A 17 year old Blue Teamer here 👍🏼

  • @Edison-newworldBlogspot
    @Edison-newworldBlogspot 3 ปีที่แล้ว

    Super satheesh boss

  • @pruthviraj4043
    @pruthviraj4043 3 ปีที่แล้ว

    nice explanation

  • @mayanksah6363
    @mayanksah6363 3 ปีที่แล้ว

    This is nice 👍

  • @manishgurawalia7625
    @manishgurawalia7625 3 ปีที่แล้ว

    Helpful, thanks for uploading

  • @souravde6116
    @souravde6116 3 ปีที่แล้ว

    Please make your own video. Do not take a direct screenshot from any other videos.

  • @souravde6116
    @souravde6116 3 ปีที่แล้ว

    Mistake in the calculation of closeness centrality between Agent 1 to Agent 4. There is only 1 shortest path to go from agent 1 to 4. And there is total 3 paths to go from agent 1 to 4 via visting node for single time.

  • @sahayaantonyraj.j5719
    @sahayaantonyraj.j5719 3 ปีที่แล้ว

    Excellent explanation

  • @ኪራA
    @ኪራA 3 ปีที่แล้ว

    Thank you! explained very well.

  • @rraattutll
    @rraattutll 3 ปีที่แล้ว

    how do we determine the centrality when two or more nodes have the same centrality?

  • @iam_naafi
    @iam_naafi 4 ปีที่แล้ว

    Nice Explanation, clean and clear. Thank You Sir !

  • @SathyamLKece
    @SathyamLKece 4 ปีที่แล้ว

    Sathyam L K (1711091) Sir it's quite intersting and easy to get the concepts and useful too.. And hereby I've added one of my favourite topics in this video.. Hypertext Transfer Protocol (HTTP) is an application-layer protocol for transmitting hypermedia documents, such as HTML. It was designed for communication between web browsers and web servers, but it can also be used for other purposes.. Malware (short for “malicious software”) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. ... Investigate the infected user's local network. Steal sensitive data.

  • @sivaramakrishnanramdoss6857
    @sivaramakrishnanramdoss6857 4 ปีที่แล้ว

    Sir, this video was very useful for us. TCP : In base terms, TCP/IP allows one computer to talk to another computer via the Internet through compiling packets of data and sending them to right location. For those who don't know, a packet, sometimes more formally referred to as a network packet, is a unit of data transmitted from one location to another. HTTP : HYPER TEXT TRANSFER PROTOCOL . It is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted.

  • @GaneshanMece
    @GaneshanMece 4 ปีที่แล้ว

    Ganeshan M 1711024 This video is really useful to learn about the malicious traffic analysis and Http request using wireshark. HTTP has two method. GET - send request to the server POST - send data to the server. http. request filter is used filter the request response. SSL- Secure socket layer it comes under the TLS. SSL is used to provide communication secure over the any network. Indicators of Compromise (IOC) are pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network

  • @mareess1218
    @mareess1218 4 ปีที่แล้ว

    Mareeswaran S 1711052 This video much useful for me to learn some new concepts

  • @anuanu1179
    @anuanu1179 4 ปีที่แล้ว

    M. Anu 1711010 This video is very useful,it is very easy for understanding the concepts. Flash file:flash files are files which added to system it may not only make changes in or system partition but in any other partition like both partition. Hash:A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes. The values are used to index a fixed-size table called a hash table.

  • @mohamedshafin4114
    @mohamedshafin4114 4 ปีที่แล้ว

    MOHAMED SHAFIN S 1711056 sir, This video is very useful and easy to understand the malicious traffic analysis and IOC and the Malware topic is quite interesting and informative too MALWARE or MALICIOUS -It is a software type ,intentionally designed to cause damage to a computer, server, client, or computer network.some examples are spyware,ransomware,viruses,worms,trojan horse etc, viruses-which can execute itself and spread by infecting other programs or files. worm - can self-replicate without a host program and typically spreads without any human interaction. Trojan horse - designed to appear as a legitimate program in order to gain access to a system. Spyware -made to collect information and data on the device user and observe their activity without their knowledge. Ransomware - designed to infect a user's system and encrypt the data. HASH -A Hash value (or simply hash), also called a message digest, is a number generated from a string of text. Hashes play a role in security systems where they're used to ensure that transmitted messages have not been tampered with the sender generates a hash of the message, encrypts it, and sends it with the message itself. The recipient then decrypts both the message and the hash, produces another hash from the received message, and compares the two hashes. If they're the same, then the message was transmitted intact. VIRUSTOTAL-Used to analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.

  • @shanthivalliammal8771
    @shanthivalliammal8771 4 ปีที่แล้ว

    Shanthi. A-1711100 ECE-B This video was very useful for completing the experiments and to get knowledge regarding those experiments. Flash file: Flash file is the master document. This file can only be opened with flash. The file extension for flash video is FLV and FLV files are preferred format for delivering video clips via flash. Executable file: An executable file is a common file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.

  • @PremkumarSece
    @PremkumarSece 4 ปีที่แล้ว

    S.Prem kumar (1711072) This video is very useful to understand the experiment which are all taught by you.It also make me to do the experiment without sorting any help . *Technical words*: " Virus total"-suspicious files and URLs to detect types of malware, automatically share them with the security community. It aggregates many antivirus products and online scan engines to check for viruses that the user's own antivirus may have missed, or to verify against any false positives. Wireshark protocol hierarchy-This feature is very useful when dealing with what protocols are running on the server. This is a tree of all the protocols in the capture. Each row contains the statistical values of one protocol.

  • @rohithjefferson.a9694
    @rohithjefferson.a9694 4 ปีที่แล้ว

    A.Rohith Jefferson 1711083 Sir, this video is really amazing and more informative . Protocol hierarchies - almost network are organised as a stack of layer. It is a tree of all the protocol in the capture. Tcp- transmission control protocol.It is web activity related information like http.

  • @shunmugavelsiva8541
    @shunmugavelsiva8541 4 ปีที่แล้ว

    Shunmugavel S - 1711099 Sir, Rather posting a manual with ways to do the experiment, this video is helpful for me to do practice in Wireshark. Audio is good and even small details and points have been explained in this video. TCP - The TCP divides the sending file into data packets, numbers them and then forwards them individually to the IP layer for delivery. Although each packet in the transmission has the same source and destination IP address, packets may be sent along multiple routes. The TCP program layer in the client computer waits until all the packets have arrived, then acknowledges those it receives and asks for the re-transmission of any, it does not based on missing packet numbers. The TCP layer then assembles the packets into a file and delivers the file to the receiving application. UDP - UDP is classified as a datagram protocol, or connection-less protocol, because it has no way of detecting whether or not both applications have finished their back-and-forth communication. Instead of correcting invalid data packets, as TCP does, UDP simply discards those packets and defers to the application layer for more detailed error detection.

  • @pradeepp
    @pradeepp 4 ปีที่แล้ว

    PRADEEP P 1711069 ECE B This video is helpfull for us In exam time it is very usefull Source port: It is the number for communication associated with the originating application on the local host Hash: Hash function is any function that can be used to map the data from arbitary size to fixed values. Protocol hireachary :It is a tree of all the protocol in the capture

  • @MariPriyadharshiniece
    @MariPriyadharshiniece 4 ปีที่แล้ว

    K.Mari Priyadharshini (1711053) This video is quite interesting and very useful sir and it help us to understand the experiment in different manner.This is first time we are dealing with malicious file and your way teaching make us to think also. MALICIOUS TRAFFIC ANALYSIS USING WIRESHARK: Traffic analysis is the process of intercepting and examining network traffic inorder to deduce information from pattern. A relatively high degree of sophistication is required to conduct traffic analysis and to protect against them. MALWARE- Malicious software 1) Malicious programs that propagate by inserting a copy of itself into and becoming part of another program- *Virus* 2) Malicious programs that replicated functional copies of themselves - *Worm* 3) Set if hacker tools used after attacker has a broken into computer system and gained root-level access - *Root-kit* 4) Malicious programs that looks legitimate but in backdoor it gives access to the system for malicious users- *Trojan Horses* For that we are usually HASH MY FILES TOOL- It is a tool used to analyse the downloaded file ,by which it extract hashes of that file . Generally a hash function is a mathematical function that converts a numberical input value to another compressed numberical value.The input to the hash function is of arbitrary length but output is always of fixed length . Values returned by the hash function are called message digest or simple hash Values. MD5-Message digest algorithm is of 128 bit .It is vulnerable to cryptographic attacks.It uses a little endian scheme. SHA-1-Simple Hash Algorithm is of length 160 bits .It appears not to be vulnerable to cryptographic attacks.It uses a big endian scheme.

  • @AbarnaKece
    @AbarnaKece 4 ปีที่แล้ว

    Abarna K (1711003) This video has clear cut explanation and was very easy to understand. PROTOCOL HIERARCHY-Most networks are organized as a stack of layers, one on the top of another. The number of layers and their names vary from network to network. Each layer has a specified function and adheres to specified protocols. VIRUS TOTAL- Used to analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.

  • @karthikeyan-ji3fh
    @karthikeyan-ji3fh 4 ปีที่แล้ว

    Karthikeyan V - 1711038 Sir,this video is very useful and understandable Hash: A hash function is any function that can be used to map data of arbitrary size to fixed-size values. DHCP:Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, and any communication protocol based on UDP or TCP.

  • @AnithaMece
    @AnithaMece 4 ปีที่แล้ว

    1711009- ANITHA M This video is useful and quite interesting. ARP-Address Resolution Protocol (ARP) is a procedure for mapping a dynamic (IP address) to a permanent physical machine address in a local area network (LAN). The physical machine address is also known as a Media Access Control or MAC address. IPv4-Internet Protocol version 4 (IPv4) is the fourth version of the (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks.

  • @SwathiniSece
    @SwathiniSece 4 ปีที่แล้ว

    Swathini - 1711116 Sir, this video is more informative and give a clear explanation about the malicious network A POST request is used to send data to the server to create a resource. Secure Socket Layer(SSL) is a networking protocol that uses two keys to encrypt data- public key known to everyone, private key known to the recipient of the message. Flash files- flash files are files which are added to system it may not only make changes in or system partition but in any other partition like boot partition.

  • @bharathimurugan351
    @bharathimurugan351 4 ปีที่แล้ว

    M.bharathi Ece-A 1711015 This video is very useful for us .the way of teaching also nice and understood the topics easily. Malware - it is the malicious software and computers program designed to infiltrate and damage computers without user consent. Tcp - reset the network capture which indicates the network issues. It is connection oriented and reliable protocol. (Transfer control protocol) Udp - it is alternative protocol communications protocol to Transfer control protocol (user datagram protocol). Http - Transfer the data between the remote device. It works client-server model.one device makes a request(the client)other one is makes respond (the server).