12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024
  • Deep dive on the complexities of email in this one:
    - Overview of how SMTP works
    - The simplicity of SMTP protocol
    - How email spoofing works
    - Reading Received headers
    - Sending Policy Framework (SPF) for spoofing prevention
    ===
    My SANS Courses:
    - SEC450 - Blue Team Fundamentals: sans.org/sec450
    - MGT551 - Building and Leading Security Operations Centers: sans.org/mgt551
    PDF Guide to Security Operations: www.sans.org/s...
    Blueprint Podcast: sans.org/bluep...
    Twitter: / sechubb
  • ХоббиХобби

Комментарии • 32

  • @Vleegz
    @Vleegz 3 года назад +14

    I demand more quality content like this! As someone getting into cyber security I appreciate the detailed well-thought-out content that you provide. Thanks!

    • @SecHubb
      @SecHubb  3 года назад +2

      I definitely plan to keep rolling out more and more, the only thing holding me back is time to get them done. Check out my Blueprint podcast available on all major platforms for a bunch of extra stuff that will help you on your journey in cyber security, and best of luck out there! :)

    • @kiranzunjar2668
      @kiranzunjar2668 2 года назад

      Oil

  • @Child0ne
    @Child0ne 2 года назад +1

    Wth… I have been searching cyber security resources to learn from on RUclips for 1yr and 1 month now and just now I finally find you channel… so mad.. you post really good content I’m pissed I’ve been missing out..

  • @diegocastillo4836
    @diegocastillo4836 2 года назад +1

    John, thank you so much for creating this content. I know it must be hard to keep pushing forward this content, but please know this has been INVALUABLE to people like myself.

  • @shuttlecrab
    @shuttlecrab Год назад +1

    Hey, thank you so much for creating this video and video series.
    I'm a new start in the cyber security industry, and this has been so freaking helpful for my email analysis workflow.
    I feel much more confident in my decision making when it comes to confirming/denying release requests emails to users.
    Thank you, John.

  • @nnii-rn7co
    @nnii-rn7co 3 месяца назад +1

    Wow this was very educative! Thanks for taking your time and explaining the email headers for the public.

  • @headshotcaptain8389
    @headshotcaptain8389 3 года назад +3

    Clear, concise and to the point. I'm really looking forward to viewing your lecture courses over at SANS!

  • @amramasfaranickname
    @amramasfaranickname 28 дней назад

    came for the look

  • @boode5957
    @boode5957 Год назад +1

    WOW just wow
    Quality content
    Really appreciate your effort please keep it up.

  • @stressless8405
    @stressless8405 Год назад +1

    Amazing shit my friend

  • @rememberwhenwe8
    @rememberwhenwe8 3 года назад +3

    You deserve more views and subscriptions. Awesome videos!

  • @probaldeepsaikia
    @probaldeepsaikia Год назад +1

    Nice video

  • @user-cj4ey2td3b
    @user-cj4ey2td3b 3 года назад +2

    Very good explanation! Well done John!

  • @mojtabasadatynia4000
    @mojtabasadatynia4000 2 года назад +1

    Great Video. Thanks

  • @zaidrehman2082
    @zaidrehman2082 3 года назад +2

    Thank you john

  • @syscabmcommunity3368
    @syscabmcommunity3368 Год назад +1

    Amazing video

  • @kumailkhas2993
    @kumailkhas2993 3 года назад +2

    Awesome explanation. Thanks John!

  • @rezamehrad8512
    @rezamehrad8512 3 года назад +2

    Thank you John, great explanation!

  • @famspower
    @famspower 3 года назад +1

    Excellent ! I really enjoyed this one

  • @warlitros
    @warlitros 2 года назад +1

    Great video! Useful concepts and tools, it helped me to understand better some concepts about mail headers. One question John, how dangerous is clicking on a potential phish link? I feel like most of the times the best way to determine if a mail is malicious is analyzing the content of the links (in a VM), and I always thought that just clicking on a url would need a browser vulnerability or something rare to cause harm, but I'm never sure.

  • @waterbottle522
    @waterbottle522 3 года назад +1

    Great tutorial John, is there away I can dig a little deeper on this subject or do you have more videos on this. I have taken a number of SANS courses, but need more of this topic, as I encounter phishing daily. Thanks

  • @marcellino8
    @marcellino8 Год назад +2

    Hi, what is the name of the plug in you installed that is parsing out the eml file, thanks

  • @gigadmin7147
    @gigadmin7147 3 года назад +2

    Impressed :)

  • @cyriljohns
    @cyriljohns Год назад

    Hi John,
    Thank you for sharing this.
    We can also use header analyzers available like from Google, ryt?

  • @TheKiddie1-it9dl
    @TheKiddie1-it9dl 7 месяцев назад

    hey could you help me with analyze spoofed email that occurred in our organization.

  • @yunusyilar2680
    @yunusyilar2680 3 года назад +1

    what is the name of the plug in you installed that is parsing out the eml file, thanks

    • @towesc
      @towesc 3 года назад

      I'm also interested in the plugin you were using please. And BTW thanks for your videos, as always clear and straight forward.

  • @CaleeMom
    @CaleeMom Год назад

    Hello. Would you be able to look at an email and help figure out if it is spoofed? TIA

  • @1UniverseGames
    @1UniverseGames 3 года назад +1

    SANS courses are way to expensive to afford...:((