Malware Hunting with Microsoft Sysintenals Tools | TryHackMe
In this video walkthrough, we covered some sysinternal tools from Microsoft that can be used to investigate the presence of malware.
#Microsoft
#sysinternals
----
Answers
motasem-notes.net/malware-hun...
--
Patreon
www.patreon.com/motasemhamdan...
Backup channel
/ @hacknotesbackup
My Movie channel:
/ @motasemhamdanhacknotes
------------
Receive video documentation
/ @motasemhamdan
----
Twitter
/ manmotasem
LinkedIn
/ motasem-hamdan-7673289b
Instagram
/ mo.vultu
Facebook
/ motasemhamdantty
Пікірлер: 16
Thank you for this video. its very good and easy to understand
Best vedio 😍😍
the best video, thanks,
awesome video, what other sources would you recommend us to start learning more of these knowledge
@MotasemHamdan
2 жыл бұрын
Letsdefend.io
you have a knack for teaching
thank you sir
Please make video on malware hunting in Crowdstrike EDR tool
Imagine a malware manipulating your systinternal tools after you add it to the PATH.
@MotasemHamdan
9 ай бұрын
Yup !
@piratimir1101
9 ай бұрын
@@MotasemHamdan Do you recommend any material to read on the information you shared in your presentation?
@piratimir1101
9 ай бұрын
Well, what source?
Hi Sir, I have query.. When Handling incident if we identify the process on proc exp based on virus total score, company name etc.. then next step is to suspend then kill and then open autorun to check and reg entries and just uncheck them will do or do we need to delete or use jump to entry and remove the value. Just building the connection of steps during IR. Thank you.
@MotasemHamdan
2 жыл бұрын
All the steps you mentioned are correct. Don't forget to check the registry, temp files and %appdata% folder.
1st🔥🔥🔥
Txh 😳