you need to learn Malware Analysis RIGHT NOW!!

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ธ.ค. 2024

ความคิดเห็น • 98

  • @JFlo264
    @JFlo264 ปีที่แล้ว +51

    As someone currently trying to enter the cybersecurity world, it's crazy to see that a channel with 7.5k subs has made me more interested and excited to a job in cybersecurity than all the big channels or courses I have done... Well done!

  • @PNWFAE
    @PNWFAE ปีที่แล้ว +3

    I love your videos, I recommended you to everyone in my class.

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +2

      Thank you for the support! Maybe there's a chance I could make this a full time gig and just make mildly entertaining educational videos for a living😅💚

  • @Solace6428
    @Solace6428 ปีที่แล้ว +13

    I've recently become super interested in this kind of stuff, so I'm happy to have found another channel that can teach me even more, especially since the video is entertaining as well as educational.

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +3

      Glad to hear it's somewhat helpful for a fellow malware enthusiast! Thank you for watching!💚

  • @MechaFps
    @MechaFps ปีที่แล้ว +4

    Production quality is top notch

  • @user-ic8kv5qm2j
    @user-ic8kv5qm2j ปีที่แล้ว

    I work as an AppSec and I am veryyyy tempted, to learn RE and Malware Analysis... seems wayyy too fun.

  • @johnsweeney2906
    @johnsweeney2906 ปีที่แล้ว

    Best Cybersec related channel on youtube

  • @SavageScientist
    @SavageScientist ปีที่แล้ว +5

    Great video and well explained, my malware analysis course took me through assembly language and my head is still smoking from that shit.

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      Thank you good sir, I've been trying to make stuff better explained with each video. I had an assembly language class that covered C and it was interesting...I didn't retain much of it but I at least know it exists if ever I want to do a deep dive into the CPU commands getting ran in malware. Based on the comments, looks like I'm going to be doing a deeper dive in the advanced tactics vid ha 😅

  • @chroz68
    @chroz68 ปีที่แล้ว +1

    advanced malware analysis would be great. i think a lot of people would be interested in seeing how highly technical ransomware works since we're seeing it on the news often.

  • @SaxaphoneMan42
    @SaxaphoneMan42 ปีที่แล้ว +2

    definitely would like to learn more on how to analyze the "gen Z malware" (great name for it btw), can't wait for your next videos, this channel is awesome

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +3

      Coming soon! 💚

    • @nateridgard5773
      @nateridgard5773 ปีที่แล้ว

      I'm just a enthusiast with a helpdesk background, but based on what you said, would it be possible to improve virtualization methods to engage Gen z malware?

  • @spiderman23sky
    @spiderman23sky ปีที่แล้ว +1

    Please drop the next video on the advanced forensic analysis bro, I’m loving your content. Subscribing before you make Cybersecurity mainstream content on TH-cam, 1 million subs is definitely achievable with your video style

  • @diegocastillo4836
    @diegocastillo4836 ปีที่แล้ว

    I just found your channel and I am loving the humor with the technical talk. Great show!

  • @evemackenzie6138
    @evemackenzie6138 ปีที่แล้ว

    I honestly really like the passive method. It's easy, calm and safe!

  • @MonLes-xt7gc
    @MonLes-xt7gc ปีที่แล้ว

    More about gen z malware!
    I love your contents

  • @miranda92051
    @miranda92051 ปีที่แล้ว

    Hello! Great video! Do you have any tips for how to harden a vmware VM to make it harder to detect?

  • @highspirit7483
    @highspirit7483 ปีที่แล้ว +3

    I wanna see those advanced tactics!

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      What flavor of malware you like?

    • @highspirit7483
      @highspirit7483 ปีที่แล้ว

      @@madhatistaken Ransomware would be tasty

    • @shawnmendrek3544
      @shawnmendrek3544 ปีที่แล้ว

      Any kind that lets me smoke a cigarette after, like sex.@@madhatistaken

  • @kevingardocki
    @kevingardocki ปีที่แล้ว +1

    Do you use active directory often in your SOC analyst role?

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +2

      Not a whole lot. I only use it to investigate user details like office locations, job title, whether or not their account is enabled, etc. We have a dedicated IAM team for AD related tasks.

    • @kevingardocki
      @kevingardocki ปีที่แล้ว

      @@madhatistaken That makes so much sense, I APPRECIATE YOU MAN.
      I'm on the road to become a security analyst myself and graduating in 6-7 months so , it's been a challenge on finding on what to study the "hardest" or allocate my very crunched time to implementing in labs.
      What would you say as an actual and ACTIVE security analyst currently in the company and position your in, I should be studying the most.
      From what I'm reading in job descriptions and so fourth, I think I should I be looking more towards log analysis , SIEM , IDS/IPS tools , and how to remediate and so fourth if I'm correct?
      Any advice on correlating my crunched time to studying the most realistic day to day tasks that you do would help tremendously, thank you.

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      @kevingardocki Best use of any extra time would be towards learning SIEM log analysis like you mentioned and IDS/IPS software for sure. It's difficult to say what SIEM or EDR you should learn because every company picks a different one of course...BUT splunk is a great option to learn since the query language is used by many. The main thing you need to know how to do as a security analyst, tools aside, is know how to figure out if some process, file, execution, registry change, network call, etc. is malicious. The remediation and response is different from company to company, they have their own policies and procedures if something is mucho bad. If I told you this process in task manager is actually a virus, what would you do? Where would you look? SIEM tools are great for network traffic yes but if there's only 1 discrete connection made but loads of weird processes and scripts occurring on 1 endpoint do you know where to look on a windows/mac/linux machine to determine if something bad is happening?
      Focus on understanding how OS work then understand some commonly used SIEM/EDR tools then understand common IR response tactics.

    • @kevingardocki
      @kevingardocki ปีที่แล้ว

      @@madhatistaken I appreciate you!! thats makes so much sense!! hard to find labs that are specifically for those tasks so thank you so much!!

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      @@kevingardocki They make a lot of incident response labs sadly. TryHackMe has a few modules, but mostly it's just understanding how hackers exploit and what tactics they use paired with what's normal behavior in an environment and what's not. I may have confused you more 😅

  • @JamesTriplettII-cs7tl
    @JamesTriplettII-cs7tl ปีที่แล้ว

    Hell yeah I'm ready for the next video!

  • @LovelyLikeThis.
    @LovelyLikeThis. ปีที่แล้ว

    what a cliffhanger. i need to know!

  • @rf9562
    @rf9562 ปีที่แล้ว +2

    Do you do that in your current job ? Does that included in SOC level 1 in THM ? Thanks, great video again :D(especially the restaurant part)

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +4

      I do this in my current position yes, there's a lot of users with installation privileges across our 20,000 plus employee environment so we're constantly having to check if what they installed is legitimate or not. This video is exactly what's included in the Soc Level 1 Intro to Malware Analysis. I just decided to animate it more instead of going through question by question like my last THM videos. Thank you for watching! 💚

  • @tearanch613
    @tearanch613 ปีที่แล้ว

    The "phish" joke. Lmao. U win.

  • @razorwire111
    @razorwire111 ปีที่แล้ว

    100% post an advanced video! Nice down and dirty video to get people interested in this stuff.

  • @Scorpy2303
    @Scorpy2303 ปีที่แล้ว

    Dude loving your vids!!! Your awesome 😎

  • @elchacal801
    @elchacal801 ปีที่แล้ว

    Yeah ima need that advanced video bro

  • @Verycoolguy1337
    @Verycoolguy1337 8 หลายเดือนก่อน

    Instructions unclear, ive now become the malware

  • @Maikeru305
    @Maikeru305 ปีที่แล้ว

    This actually sounds super fun. Deathnote hacker edition lol

  • @evanj51
    @evanj51 ปีที่แล้ว

    bro that dinner skit was funny lol

  • @amechi
    @amechi ปีที่แล้ว

    Everytime I watch one of your videos, my hat gets madder

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      The #cyberarmy grows madder by the day! Thank you for watching! 💚

    • @amechi
      @amechi ปีที่แล้ว

      @@madhatistaken 😡🎩💪🏾

  • @_Saint_gaming
    @_Saint_gaming ปีที่แล้ว +3

    This guy makes learning so fun!
    I appreciate you bro.

  • @anantP-ip8op
    @anantP-ip8op ปีที่แล้ว

    Hi , are there enough number of jobs in this domain ? Will it be taken over by automation tools

  • @TheRockIsCooking
    @TheRockIsCooking ปีที่แล้ว

    Can you do a review of Josh Madakor’s cyber security course? And compare it to the google cert? Pls

  • @andreelyusef3235
    @andreelyusef3235 9 วันที่ผ่านมา

    I am curios to your opinions to the master of cyber security and getting these type of skills. Would you rate red team skill or digital forensics as more important? Any views from other members are also appreciated.

  • @nou4219
    @nou4219 ปีที่แล้ว

    i fucking love the skits, subbed instantly

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว

      I'm always unsure about adding those in 😅welcome aboard the mad hat #cyberarmy 💚

  • @drickzee
    @drickzee ปีที่แล้ว

    I didn't know Dominos serve malware special 🤣 great content as always!

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      It's all a front. Their pizza isn't even real! 😅

  • @TheSwayzeTrain
    @TheSwayzeTrain ปีที่แล้ว

    This was a good one thanks

  • @PNWFAE
    @PNWFAE ปีที่แล้ว

    Can we get some Mad Hat cyber army merch 👀

  • @cybercat2025
    @cybercat2025 11 หลายเดือนก่อน

    great channel

  • @bitcode_
    @bitcode_ 7 หลายเดือนก่อน

    Yes

  • @queshyrs7879
    @queshyrs7879 ปีที่แล้ว

    I was wondering if theres any certs you recommend going from Help Desk to SOC - currently im looking at sec+ and net+ .. any others you recommend?

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว

      You could bypass net+ and just take the new Google cert (my last vid went over it). It's not going to stand out in a resume, but will teach you network fundamentals and prepare you for the Sec+. SOC positions don't typically look for network certificates, those are more for network security engineers or NOC positions. Blue Team Level 1 cert is pretty well known as well and the CySA+ is designed for security analysts. I always send people to this roadmap chart, check out the blue certs!
      pauljerimy.com/security-certification-roadmap/

  • @TequilaSunset_
    @TequilaSunset_ ปีที่แล้ว

    Not sure why the algorithm brought me here, but I’m here to stay :D

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว

      Welcome to the mad hat #cyberarmy 💚Hope I can provide some helpful stuff!

  • @everything-om3zx
    @everything-om3zx ปีที่แล้ว

    dont you think its a bad practice when you upload your files to these Online sandboxes, like the analysis will be public. so if i get a suspicious document and it has something important that is confidential and at end the file is not malicious. now that file is downloadable by anyone. as far as i know thats true with anyrun. it would be better to have our own sandbox.

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว

      Very good point I didn't highlight in the vid. It is bad practice yes. Files that could contain business sensitive data should be ran in private sandbox. Crowdstrike is my private go to and any run has private mode, however I only run installation files there that I know don't relate to business data. Intention was to show how to do it safely, not necessarily define business sensitive data.

  • @RashidRaja
    @RashidRaja ปีที่แล้ว

    honestly love your videos - brilliantly done - makes me want to learn shit!

  • @BreakingBread443
    @BreakingBread443 ปีที่แล้ว

    Great video!

  • @Squinkle
    @Squinkle ปีที่แล้ว

    nice video big dawg

  • @kevingardocki
    @kevingardocki ปีที่แล้ว

    Hey MadHat!
    I'm starting a cybersecurity podcast for professionals like you, I would love to interview you about your experience and tips you can give for us newbies getting into the industry or recent graduates! Please let me know if you're down!

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      I've never done a podcast before. Not sure I'm famous enough for people to care what I say ahah but maybe.

    • @kevingardocki
      @kevingardocki ปีที่แล้ว

      @@madhatistaken if you’d like ! I think you’re for sure making a difference in the cybersecurity community and helping so many people

    • @kevingardocki
      @kevingardocki ปีที่แล้ว

      @@madhatistaken Let me know if you're down on a weekend day or after work!

  • @MohamedSayedAbdElRaheem
    @MohamedSayedAbdElRaheem ปีที่แล้ว

    amazing another video

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      Thank you! 😁Hope it was helpful!

  • @DubbLpresents
    @DubbLpresents ปีที่แล้ว

    im beyond lost and to think im going to college for this in a week

  • @thearts7702
    @thearts7702 ปีที่แล้ว

    we would love to see that video lol

  • @0diepus
    @0diepus ปีที่แล้ว

    Do it!

  • @bulba888
    @bulba888 11 หลายเดือนก่อน

    PMS

  • @blankphrank
    @blankphrank ปีที่แล้ว +4

    Bro, we need that advanced analysis video! 📠💯

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      What flavor of malware do you prefer?

    • @trickwheel
      @trickwheel ปีที่แล้ว +1

      I would like to order the sampler plate

    • @madhatistaken
      @madhatistaken  ปีที่แล้ว +1

      @@trickwheel Superb choice! Mmmyes😅

  • @shawnmendrek3544
    @shawnmendrek3544 ปีที่แล้ว

    Tiktokers never learn. Sad thing is phones come with that crap and other bad apps. Along with bloat ware crap(yea win11 we are talking about you). API calls do not seem diff from windows. Though we used ASM for disassembling, hex editor s, other crap. Polymorphic malware really made it difficult to detect malware/trojans. I know because we used it for trojans, basically we did not have to update the files code constantly anymore. Packing the files became useless over time as well, as virus total became better.
    Thanks for teaching me some Linux, never used it before. Or ubuntu(less sad I know to never used either). Is it possible to dual boot Windows and Linux? Is there a reason you do not w ant to be seen? Probably for company/work reasons?

  • @iespinosa31
    @iespinosa31 ปีที่แล้ว

    shaken not stirred

  • @boulilanourelhak9638
    @boulilanourelhak9638 ปีที่แล้ว

    now

  • @bleonciofs
    @bleonciofs ปีที่แล้ว

    so funny bro

  • @elchinsir
    @elchinsir 6 หลายเดือนก่อน

    It would be better if you didn’t push for those ‘funny’ cartoons

  • @TheIntermediatePianist
    @TheIntermediatePianist 3 หลายเดือนก่อน

    You go too fast for me to want to pay attention.

  • @AnoynomousARX
    @AnoynomousARX ปีที่แล้ว +1

    hello, first comment!!!