Understanding Windows Core Processes For Cyber Security Analysts | TryHackMe

Поделиться
HTML-код
  • Опубликовано: 20 авг 2024
  • In this video walkthrough, we covered windows core processes and demonstrated what is a normal behaviour for a windows process to easily spot malwares
    #windows
    #tryhackme
    ----
    Patreon
    www.patreon.co...
    Backup channel
    / @karppiandspecter-tvshows
    My Movie channel:
    / @motasemhamdanhacknotes
    ------------
    Receive video documentation
    / @motasemhamdan
    ----
    Do you need private cybersecurity training? sign up here
    motasem-notes....
    --
    Twitter
    / manmotasem
    LinkedIn
    / motasem-hamdan-7673289b
    Instagram
    / mo.vultu
    Facebook
    / motasemhamdantty

Комментарии • 13

  • @memepasmal77
    @memepasmal77 3 месяца назад +1

    Thank you for the great job.

  • @manafhousin9973
    @manafhousin9973 6 месяцев назад +1

    Thank you MAN!

  • @abdullahb.9746
    @abdullahb.9746 Год назад +1

    thank you bro

  • @alisahin3166
    @alisahin3166 Год назад +1

    Why is it stating, that the parent of csrss.exe and wininnit.exe is a "non-existent process", while smss.exe is existing? Can some please explain?

    • @cur53d34
      @cur53d34 Год назад +1

      from what i understood, smss.exe exists just for some time, does what it should do, then terminates itself, and I guess by the time the child processes are called, smss.exe have already terminated itself. You can see that in Task 4 in the appropriate room in THM

    • @alisahin3166
      @alisahin3166 Год назад

      @@cur53d34 Yea, that was also my understanding at that time. But actually there are 3 smss processes - 1 master smss process, which does not terminate itself and then two temporary "child" processes of smss, that are also called smss (but differentiated in session 0 & 1), which terminate themselfes after creating their child processes, which I mentioned in my first post.
      Edit: Here is a good explanation: ruclips.net/video/pmy2_tCT6Sk/видео.html

  • @ronakrawal8325
    @ronakrawal8325 3 года назад +2

    I have a question. can we sniff phone calls and SMS if yes then how?

    • @islandpenguin5056
      @islandpenguin5056 3 года назад +8

      How big is your nose?

    • @faizanarif2610
      @faizanarif2610 3 года назад +3

      First you buy Hardware and Install Scripts into it, With these functionality VLH/MSC (Visitor Location Register/ Mobile Switching Center) In Simple words you would Create A complete Mobile Tower with all the functionality in it Just small in size. You should be in close range with your experiment subject (range depend on how expensive can you get). Once you have all the details on the screen. Grab Blank SIM and put it in SIM Card Reader. that's ALL. Its worth the shot if you'd also prepare yourself for jail food.

    • @itsm3dud39
      @itsm3dud39 2 года назад

      @@faizanarif2610 if you can hack the particular company then no need of making tower

    • @Aresindian
      @Aresindian Год назад

      @@faizanarif2610 you can tap voice over internet protocol

  • @babayaga8663
    @babayaga8663 Год назад

    what if command line is N/A