Network Threat Hunting Made Easy (Finding Hackers)

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024
  • jh.live/pwyc || Jump into Pay What You Can training at whatever cost makes sense for you! jh.live/pwyc
    Free Cybersecurity Education and Ethical Hacking with John Hammond
    📧 JOIN MY NEWSLETTER ➡ jh.live/email
    🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎 FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥 RUclips ALGORITHM ➡ Like, Comment, & Subscribe!

Комментарии • 39

  • @ChrisGreer
    @ChrisGreer 7 месяцев назад +38

    @johnhammond you had me at pcap - Gonna check out this tool to complement my Wireshark analysis. Great vid my friend!

  • @rrittenhouse
    @rrittenhouse 7 месяцев назад +7

    Lets gooo! I've always had a soft spot for threat hunting. I just didn't realize there was a term for it until recently 🤣 I love messing with AC Hunter/RITA. I just took the Active Defense & Cyber Deception course last week. I am in the Zoom webinar now for the SOC Core Skills class now. John Strand is an amazing teacher as well!

  • @j.ianmichel3059
    @j.ianmichel3059 7 месяцев назад +3

    BHIS and Antisyphon are killing it in the training area. I just to the Antisyphon SOC Core Skills and it is upping my game and making me more confident as a New to SOC analyst. Thanks for covering this John I look forwarded to doing a lab with this. Keep it up!

  • @ThisPageIntentionallyLeftBlank
    @ThisPageIntentionallyLeftBlank 7 месяцев назад +3

    As a product designer in cyber, the UI makes my soul hurt. It looks like work I did back in 2007, and although it’s got that “coooool” factor, there is a tremendous amount of non-data pixels which impacts usability, accessibility, and cognitive load.

    • @Ati27
      @Ati27 7 месяцев назад +3

      Yep, the UI is horrendous, it looks like some old Flash stuff or cheap Hollywood. Ironically, RITA, which is just the engine and html report files is better.

    • @ThisPageIntentionallyLeftBlank
      @ThisPageIntentionallyLeftBlank 4 месяца назад

      @@Ati27 that’s hilarious because it reminds me of old flash work of mine from the days before everyone knew flash was about as secure as a tinfoil boat.

  • @TheBenSanders
    @TheBenSanders 7 месяцев назад +3

    John, just realized you hit over 1M subs!
    Congrats and thank you for peaking my interest in cyber security!

  • @LoneWolf-dj7so
    @LoneWolf-dj7so 7 месяцев назад +3

    Great video . I just started watching but I don’t expect anything less from you 👍😎

  • @crashtfa
    @crashtfa 7 месяцев назад +1

    Another amazing project for doing this is Malcolm (as in in the middle)

  • @satejratnaparkhi
    @satejratnaparkhi 7 месяцев назад +1

    Now things getting interesting, infosec people gives some focus on designing, by the way fantastic tool and yeah does it works on linux as well??

  • @inavasmorales
    @inavasmorales 7 месяцев назад

    Awesome vlog, loved the suggested training.

  • @victorwambugu1115
    @victorwambugu1115 7 месяцев назад +3

    great videos

  • @jonathondelemos4609
    @jonathondelemos4609 2 месяца назад

    How viable is this? Is this used in the field as a viable tool?

  • @ChairmanHehe
    @ChairmanHehe 7 месяцев назад +1

    would normally just de-bell but i like you john -- not a fan of the "cool sounding generic topic / advertisement' format

  • @dadamnmayne
    @dadamnmayne 7 месяцев назад +4

    99% of these connections are going to be Google and Microsoft. 😑

    • @eli_the_crypto_guy
      @eli_the_crypto_guy 7 месяцев назад

      John just showed you the C2 over Gmail infrastructure, din't assume it is all good

    • @dadamnmayne
      @dadamnmayne 7 месяцев назад

      @@eli_the_crypto_guy none of it is good. name a bigger apt than google and Microsoft. (Of course they mean well, so they'd be the unintentional apt)

    • @gitgudsec
      @gitgudsec 5 месяцев назад

      You can safelist those connections then they won't keep showing up, like literally any defensive tool there is a period of baselining.

  • @Michael_Jackson187
    @Michael_Jackson187 7 месяцев назад

    Isn’t there some stat like most successful threat actors are moving around the network for 6 months before detection on average?
    I mean all you really need is 30 days.

  • @Starwarsfan67
    @Starwarsfan67 7 месяцев назад +1

    I always keep mistaken your name for John Hammond from jurassic park

  • @PiyalPiyal-op6kq
    @PiyalPiyal-op6kq 6 месяцев назад

    Thanbi thrastha wadiyo onama pon akak kelinawa unta viruddawa cament dapu gaman k.o

  • @xCheddarB0b42x
    @xCheddarB0b42x 7 месяцев назад

    cool tool

  • @user-rj8wm4iu5v
    @user-rj8wm4iu5v 6 месяцев назад

    Please help me 🥺

  • @shephusted2714
    @shephusted2714 7 месяцев назад

    it should be open source and not walled garden paid training jazz - this is more or less just a rev grab

    • @gitgudsec
      @gitgudsec 5 месяцев назад

      yeah how dare they charge money for their time and effort, you are owed everything for free obvs.

  • @user-dh6wu3wq3i
    @user-dh6wu3wq3i 6 месяцев назад

    beautiful beautiful world superb 7Starrrrrrrstopplerrrs godee knowledgeable wellth cute superb heero respectable loving venus❤❤❤

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked 7 месяцев назад +2

    Early crew. 4th. Lulz. XD Shalom.

  • @therealslimpanda
    @therealslimpanda 7 месяцев назад +1

    Love you, love your content. That website is bullshit, I couldn't find anything below 295+ for courses and the first class I looked at was $100-$1000 per person. I don't know of you know this but if you do... shame

    • @nordgaren2358
      @nordgaren2358 7 месяцев назад

      did you do more than just look at one page? Did you adjust the sliders on the page? Did you go to where the actual payment is that was shown in the video that shows you what the minimum price is?

    • @therealslimpanda
      @therealslimpanda 7 месяцев назад

      @nordgaren2358 who are you to attack me with questions? That's very rude. I did look around and check out different things. Why would you assume I did not? Just because I used the first video as a reference? Would me saying, "The 38th episode I saw...". As weird as it sounds, the first one I happened to click upon was a pricey one. I did check out others, but I didn't look at too many because they were pricey.

    • @nordgaren2358
      @nordgaren2358 7 месяцев назад

      @@therealslimpanda I asked you if you did your due diligence. I didn't attack you.

    • @nordgaren2358
      @nordgaren2358 7 месяцев назад

      @@therealslimpanda what makes me think you didn't is because other people have had this problem, and because I have seen the pricing myself.

    • @nordgaren2358
      @nordgaren2358 7 месяцев назад

      You are literally also quoting the price for access to the cyber range, which is in ADDITION to the training. Not the training itself. So there are multiple reasons to think you didn't look. I literally clicked the first available course, and it says $25 as the minimum price. That is exactly as advertised.

  • @carsonjamesiv2512
    @carsonjamesiv2512 7 месяцев назад

    😃👍

  • @Dreams_On_the_way
    @Dreams_On_the_way 7 месяцев назад

    Nothing is understandable

    • @jameezybreezy9030
      @jameezybreezy9030 7 месяцев назад +1

      One day it will all make sense my friend