Gonna save this and watch it later , this content can’t be found anywhere on TH-cam honestly , all either outdated or not explained properly but your videos are quality it feels like we got what we paid for except it’s free 😍
Another excellent presentation. Great tips and explanation analyzing a phishing email. Thank you for the guidance you provide it is defiantly appreciated!
Hi! In The phishing analysis 2 couldn't find the last 3 answers I tried but I couldn't. Can I get any help from your side? Especially in finding the URL analysis.
This had me laughing last night. Bill Jobs... and microapple. Gotta love it. I'm correct when I say that you have all these resources downloaded in the guest on your virtual box? So they are all on the Windows 10 VM, right?
Hello, Is there a breakdown step by step of a SOC analyst should always do? like no matter the threat you automatically do these steps first. Does this list exist?
Kinda not really if that makes sense lol - What you’re looking for are called run books and these will vary by organizations since not all triage of a same threat will be the same due to process & technology. There are generic ones out there but its not something I would follow automatically but rather use as a guide.
Hey is it okay if i create a blog narrating the steps done to accomplish this lab of i decide to do it as proof and evidence that I did it ? With your permission of course
When you say he I am going to assume you're referring to me haha - I created a virtual machine for this and I will always recommend others who participate in labs to spin up their own virtual machine because it is just easier and safer to work with!
@@MyDFIR For clarification. I am fairly new to the concept. I heard a VM from oracle ; virtual box can be downloaded and kali Linux installed on that VM. I haven’t physically done this but an illustration would be welcomed.
No worries! I have a video here that can help you get started. Cybersecurity Tip: Build A Basic Home Lab (1/3) th-cam.com/video/kku0fVfksrk/w-d-xo.html
@@MyDFIR when i am explaining interviewer about phishing email analysis.. he asked why email gateway hasn’t blocked it when spf and dkim fails and no alignment… if it blocks straight away no need of further investigation as well… am confused at this stage what to answer… please help me
@@MyDFIR i can reply email gateway works on signature based i mean blacklists.. hence it was not updated with latest signature or there might be a delay between new phishing campaign launch and update of these lists, hence email bypassed
@@MyDFIR I've definitely learned enough to be even more cautious. I've done a lot of surfing TH-cam, especially more on scanning emails. That is something that I will continue to encounter and it will be interesting to be able to do more than block suspicious emails. No one comes close to the one you did. Perhaps you can do more? ;-)
Gonna save this and watch it later , this content can’t be found anywhere on TH-cam honestly , all either outdated or not explained properly but your videos are quality it feels like we got what we paid for except it’s free 😍
Right this is amazing. Doing the same
Haha love it! We do things DFIRINTLY here 👀👀
bro As a SOC analyst i have never seen such a good email analysis video in TH-cam, great job and thanks for this video
I appreciate that! Thank you
Holy crap dude, I thought I was doing phishing analysis on my job, great job! Continue this way!
Thanks for watching!
I can already tell this is a great video, I wish I'd watched this before doing my CySA last month.
How has SANS not hired this guy yet??
Haha thank you for the kind words! That would be quite incredible…SANS instructor 👀👀
My number one Cyber Instructor!! 🔥🔥🔥
❤️ thanks for watching!
Your course is wanderfull.
Thank you! Super happy to hear that 😁
Wow cant thank you enough for these labs!
Keep up the amazing work.
Thank you for watching! 🙌
your videos are a God-send to aspiring SOC analysts just applied to my first few junior SOC analysts positions thanks to you
Great to hear! Best of luck 🙌
This was another wicked tutorial, thanks for everything you do.
Can’t wait for the course, been waiting for a good practical course
Thanks for watching ❤️ Course is coming soon!
Passed the sec+ now onto btl1.. this will help. Thanks for the inspiration
Congratulations! Time to level up those hands on skills 💪
Those labs activities are amazing!
Yeah! They are super fun and educational
With content like this it's no wonder your channel has grown so much so quickly. Can't wait to learn more about your course.
I appreciate that!
Another excellent presentation. Great tips and explanation analyzing a phishing email. Thank you for the guidance you provide it is defiantly appreciated!
My pleasure! Thanks for watching ❤️
well-explained. Thanks for the video
Glad it was helpful!
The One we didnt know we needed... FIRE content
Much love ❤️ I appreciate you!
Im having the hardest time trying to find the attachment file names but im not quitting
Ty for doing a updated version of:)
very detailed if i may ask are these tools the tools used for email analysis or there other tools that can be used
this is amazing man. I always love your content. Keep Going.
Thanks!
I love your content, may you kindly do more content
Thank you!
Wow! Wonderful. Thank you
My pleasure, thanks for watching ❤️
Solid material, and I'm definitely looking forward to your course
Awesome, thank you!
Valuable Presentation. Thanks for sharing mate
Glad you enjoyed it!
Fantastic walkthrough, as usual.
Glad you enjoyed it ❤️
Grind never stops 🤝
You know it!
Whow! And that one was an easy one?
Great explanation!
Thanks!
Hi!
In The phishing analysis 2 couldn't find the last 3 answers
I tried but I couldn't. Can I get any help from your side? Especially in finding the URL analysis.
@MYDFIR, Beast mode.. Good job
Thanks ❤️
Simply awesome,👌❣Your content is always different from the rest. Keep them coming sir.🤝
Will do! Thanks for watching ❤️
Gold ! Thank you !
You bet! 🙌
Hey ! this is awesome can you do more videos like this 👌👌👌👌👌😍😍😍😍
Sure 😊
Super important vid.
Thank you🙌
This is great ❤❤❤
Thanks ❤️
things are not hard if teaches correctly. Thank you so much thoose were too confusing to me before this video
Glad it was helpful! I have a lot more of these videos on my channel. Feel free to take a look 💪
Nice Video!, Where can I find more examples of these email analysis?
In my course I provide more examples for email analysis! Other than that, there are blogs out there that walk you through email analysis.
Can u do more BTLO labs!!!loved it!!Thank you so muchh!!!Keep going❤🎉
Of course!!
Wow thank you!
You're welcome!
Powerful 😅 I learnt alot thanks 💯😊😊
You’re welcome 😊
Saw new video, immediately clicked on.
You’re simply amazing. ❤️
your the best thank you!
in general this is somthing that you suggest to upload to github for example?
No, this is something you can talk about during an interview when you are asked about phishing/email investigations.
I honestly needed this so much as a client keeps requesting I analyse the phishing emails he gets hahahahaha
Glad it was helpful ❤️
Amazing content !!!
Thank you 🙌
How do you make the text yellow and show the keywords on Notepad++?
You could use different “languages” in notepad++ to help with this
This had me laughing last night. Bill Jobs... and microapple. Gotta love it.
I'm correct when I say that you have all these resources downloaded in the guest on your virtual box? So they are all on the Windows 10 VM, right?
😂😂 yea you’re absolutely correct!
Hello, Is there a breakdown step by step of a SOC analyst should always do? like no matter the threat you automatically do these steps first. Does this list exist?
Kinda not really if that makes sense lol - What you’re looking for are called run books and these will vary by organizations since not all triage of a same threat will be the same due to process & technology. There are generic ones out there but its not something I would follow automatically but rather use as a guide.
My hero how is going your course? As you said till Ende Mai or First juny will be released?
Had to push to June, expect June 10th (my 1 year anniversary on TH-cam) 😄
Really amazing to be honest, but how can i add this to my CV?
If you really wanted, you could add this as a skill (phishing investigation)
Nice lab
Thank you ❤️
that was fun
Woohoo! Thanks for watching and be on the lookout for more lab series!
How would you get an email file like the one that is being evaluated in the video?
In a real world situation, not the training email file.
I hopped on gmail, clicked on “show original”, immediately figured it out. I want to thank myself for my quick help.
Great job 🙌
Hey is it okay if i create a blog narrating the steps done to accomplish this lab of i decide to do it as proof and evidence that I did it ? With your permission of course
Yes of course 👍thanks for asking
So phyishing, and malware analysis is important for SOC too
Yup - Malware, Identity, Endpoint, Network & Cloud is what you need to learn and know as a SOC analyst :)
Did he created a virtual machine or did he went to a website that provides virtual machine?
When you say he I am going to assume you're referring to me haha - I created a virtual machine for this and I will always recommend others who participate in labs to spin up their own virtual machine because it is just easier and safer to work with!
@@MyDFIR For clarification. I am fairly new to the concept. I heard a VM from oracle ; virtual box can be downloaded and kali Linux installed on that VM. I haven’t physically done this but an illustration would be welcomed.
No worries! I have a video here that can help you get started.
Cybersecurity Tip: Build A Basic Home Lab (1/3)
th-cam.com/video/kku0fVfksrk/w-d-xo.html
how to download the email file from outlook please ?
support.microsoft.com/en-us/office/save-an-outlook-message-as-a-eml-file-or-a-pdf-file-4821bcd4-7687-4d6d-a486-b89a291a56e2
email gateway doesn't block spf fail mails?
In a perfect world it would!
@@MyDFIR when i am explaining interviewer about phishing email analysis.. he asked why email gateway hasn’t blocked it when spf and dkim fails and no alignment… if it blocks straight away no need of further investigation as well… am confused at this stage what to answer… please help me
@@MyDFIR i can reply email gateway works on signature based i mean blacklists.. hence it was not updated with latest signature or there might be a delay between new phishing campaign launch and update of these lists, hence email bypassed
@@MyDFIR can you correct me here?
Co Can Da??? What kind of magic roundabout drug-induced swizzle-sticks is this?? 😂
LOL yeah when I first read it I was like... am I saying this right?!
just observation: he said first couple of bytes but he copied first 4 bytes for file singnature
Heheh english is hard but yes you’re correct.
HAHAHA I keep having questions and posting them and then realizing the answer and deleting the posts.
😂it happens! How are you enjoying the content so far? Hoping you’re learning lots!
@@MyDFIR I've definitely learned enough to be even more cautious. I've done a lot of surfing TH-cam, especially more on scanning emails. That is something that I will continue to encounter and it will be interesting to be able to do more than block suspicious emails.
No one comes close to the one you did. Perhaps you can do more? ;-)
👀👀👀 maybe haha thanks!
give me your course free 😥😥
My TH-cam videos are just as good as the course and those are free 😁
amazing video thx bro