if my host machine has antivirus on it, will it interfere with downloads on the VM?
@avengerslogan96583 күн бұрын
You gave us tone of new information! keep it up!
@HasaanQadri-f5t6 күн бұрын
what if i wanna use vmware instead?
@danielbarreto837 күн бұрын
KZbin won't and don't allow Malware for download, please be cautious!!!
@boulingrinnicolas34019 күн бұрын
struggling with this chapter
@subliminalsanctuary783214 күн бұрын
Please also upload the Pcap of this because it is meaningless
@GPR-d9k17 күн бұрын
What s here name...
@chapin251327 күн бұрын
inside the lab environment , my windows virtual environment doesn't connect to the interenet ! what's the issue?
@Bo7mead29 күн бұрын
I enjoyed the write-up more; it gave way more details. Unfortunately, there are none for this section. :(
@seanhogan472Ай бұрын
Not a planned way of delivering a professional training.. lots of jumping around..
@silverindeed2406Ай бұрын
Im confused whats the point of building this virtual lab ourselves if you dont give us the malware and have us do it in your virtual environment. Whats the point of building our own. I don't get it
@joketechnology1796Ай бұрын
The books is bad learning?
@therealjoevalentinАй бұрын
would this work on a MaC?
@Fun-fh5znАй бұрын
5 hours setup really ?
@Leg4cy86Ай бұрын
Hey there everyone. Just passing by to explain what each "Security" value means. In general, the "Security" field in the metadata of a Microsoft Office document is related to the level of protection/restrictions applied to the file. Below are the values and the meaning of each: - - - - - - - - - - - - - - - 0 - No security applied. The document is open without any restrictions. 1 - Password-protected for opening. A password is required to open the document. 2 - Password-protected for modifications. A password is needed to edit the document, but it can be viewed without one. 3 - Password-protected for both opening and modifications. Requires different passwords to open and modify. 4 - Read-only recommended. The document suggests opening in read-only mode, but it’s not enforced. 5 - Password-protected for opening + Read-only recommended. Requires a password to open, and suggests read-only mode. 6 - Password-protected for modifications + Read-only recommended. Editing requires a password, and it suggests read-only mode. 7 - Password-protected for both opening and modifications + Read-only recommended. Passwords are required for both actions, and it suggests read-only mode. 8 - Encrypted document. The file is protected with encryption, usually with password protection. 9 - Password-protected for opening + Encrypted. Requires a password to open, and the file is encrypted. 10 - Password-protected for modifications + Encrypted. Editing requires a password, and the file is encrypted. 11 - Password-protected for both opening and modifications + Encrypted. Full security with encryption. 12 - Read-only recommended + Encrypted. The document suggests read-only mode and is encrypted. 13 - Password-protected for opening + Read-only recommended + Encrypted. Requires a password to open, suggests read-only, and is encrypted. 14 - Password-protected for modifications + Read-only recommended + Encrypted. Editing requires a password, suggests read-only, and is encrypted. 15 - Password-protected for both opening and modifications + Read-only recommended + Encrypted. The document has all security features enabled. - - - - - - - - - - - - - - - Cheers :)
@sakhumuzisakhi19822 ай бұрын
I have just subscribed for the VIP and when I interact with LetsDefend its not user friendly please improve because we are using money here and its alot
@jonhycosta46832 ай бұрын
Very good content!
@cringykid53062 ай бұрын
How is LetsDefend different from TryHackMe?
@TheBeach55632 ай бұрын
Thanks for sharing. I work as network admin. I do some basic cybersecurity tasks and network monitoring. This would be good for me. Sounds inspiring.
@maggidishashank18472 ай бұрын
How to start the basics from scratch SOC analyst L1?
@neko_jammer62093 ай бұрын
it's not broken. You just forgot the "!".
@udageethdias3 ай бұрын
This was very helpful ❤
@Overlord-vm3gm3 ай бұрын
Thanks mate
@MongiNTS3YT3 ай бұрын
Im scared to have my malware analysis machine in Bridged mode to do proper Dynamic Analysis cos i fear anything propegating to my host or any other device on our network
@sebastianschirm12113 ай бұрын
Do not use bridged mode instead use Host only mode if you don’t need the internet but if you do switch to NAT
@martabakselatan23 ай бұрын
the quality part compare regshot so bad, is that editing
@sebastianschirm12113 ай бұрын
I can not even see is very blurry
@MarcosPinheiro-cy3oo3 ай бұрын
I would have liked to see the network settings so that the malware analysis could be done safely. I know the network adapter should be in host-only mode, but wouldn't that leave the VM without internet? Should I enable two network adapters? One in NAT and the other in host-only?
@sebastianschirm12113 ай бұрын
You will have to keep switching between both network interface as you progress with the analysis.Once you need internet switch to NAT and immediately switch back to Host only once done to avoid any issues
@arnabdas89983 ай бұрын
Honestly not that impressive
@sebastianflores19543 ай бұрын
Bro this is amazing, thanks
@ZeeWolfed3 ай бұрын
Are you making more video like this is just so F helpful mate Thanks
@ZeeWolfed3 ай бұрын
Awesome
@ZeeWolfed3 ай бұрын
awesome thank
@Durrpadil4 ай бұрын
Thank you! I had a super positive interview with a CISO. I'm always thrilled when preparation questions are available. You rock.
@benb82914 ай бұрын
For those wondering...this is part of the SOC Analyst Learning Path in letsdefend site. This particular Module is free so you can sign up and do this
@Ahmed_Hossamm4 ай бұрын
thank you so much man!
@eduxchief4 ай бұрын
These files are no longer available on the website, please update to something more recent. thanks
@fm0x14 ай бұрын
Amazing!! Thankss <33
@omvrgayar72994 ай бұрын
I think the security tag it's meant to be that this document isn't secure or it has malicious scripts maybe, but I'am not so sure about it.
@dominicmarsh30644 ай бұрын
how did you install xorsearch on a Linux machine?
@omvrgayar72994 ай бұрын
This shit took 4 hours and 15 mins but bro regardless all this fuckin time it looks super amazing
@koko85815 ай бұрын
Greaat Great Video , But anyone have the same sample he working on ? because LetsDefend now ,not letting u download the sample , you work on their environment I searched on Malware Bazzar with hash and could not find any
@caseyrivera27655 ай бұрын
Its funny cause youll most likely get a job as a blue teamer
@Ad9911io5 ай бұрын
Hope i can edit myself when answering live
@lyquockhanhly63195 ай бұрын
Good
@ucheemmanuel84665 ай бұрын
Thank you for this great content
@StanleyMathews-v3w5 ай бұрын
This is pointless without the files. SMH
@toukio_6 ай бұрын
Thank you! This video cleared some of the things and procedures I don't understand about static malware analysis.
@CandelGaming6 ай бұрын
I try to search a url given in the SOC Fundamentals course but don't show any result kindly resolve this Search problem