Malware Analysis Tools YOU COULD USE

Поделиться
HTML-код
  • Опубликовано: 2 июн 2024
  • Malware analysis tools for 2024: I look at some up and coming malware analysis tools everyone can use like Triage, Capa and ActivityView. Whether you want to do system forensics or binary reverse engineering, you'll find one of these quite useful. Get NordVPN (discounted) : nordvpn.com/tpsc (sponsor)
    Buy the best antivirus: thepcsecuritychannel.com/best...
    Join the discussion on Discord: discord.tpsc.tech/
    Get your business endpoints tested by us: tpsc.tech/
    Contact us for business: thepcsecuritychannel.com/contact
  • НаукаНаука

Комментарии • 124

  • @Orblets
    @Orblets 4 месяца назад +8

    Bro I was looking for something exactly like last activity view today and couple hours later this video shows in my recommended. Thank you!

  • @Q-432hz
    @Q-432hz 4 месяца назад +20

    Excellent upload 🎉 Thank for your work 👍🏾

  • @GeorgeG-is6ov
    @GeorgeG-is6ov 4 месяца назад +5

    thank you bro I was waiting so long for this

  • @Wahinies
    @Wahinies 4 месяца назад +8

    Yooo this is an amazing example of enhancing the global security posture by educating. Thank you for this set!

  • @alexxx4434
    @alexxx4434 4 месяца назад +7

    Nir Soft freeware system tools are great! Been using them a long time.

  • @balajisharathkumar9753
    @balajisharathkumar9753 4 месяца назад +9

    wow awesome tools thanks for knowledge sharing for security knowledge is there any equal siem tool available in the market ?

  • @HoshangGovil
    @HoshangGovil 4 месяца назад +11

    I have learnt a lot from you and will be learning more in the future.
    Thank you!

    • @akureiokamii
      @akureiokamii 4 месяца назад

      Thank you! Do not redeem good sarr!

  • @samfisher5302
    @samfisher5302 3 месяца назад

    Great video! Thank you!

  • @bobwyde4026
    @bobwyde4026 4 месяца назад +1

    Your channel is a god send

  • @DdragonGun001
    @DdragonGun001 2 месяца назад

    Some tools I use are Capa, bstrings, procmon, pestudio, and running things on inetsim

  • @HikaruAkitsuki
    @HikaruAkitsuki 4 месяца назад +6

    My main Working Station is Virtual Machine. I refuse to do my activity on Bare Metal. VM is easy to deal if there is something went wrong. You can just Snapshot it or delete entirely and install a fresh one.

    • @wannabedal-adx458
      @wannabedal-adx458 4 месяца назад

      That is actually a great idea. So the snapshot has all of your applications previously configured to it, right? and then how do you move or work with you data in and out of the VM? Meaning how do you keep it secure if it is sitting on a NAS or a USB flash drive (that you don't share)? Thanks.

    • @user-jm8sy5ox2j
      @user-jm8sy5ox2j 4 месяца назад +3

      Using a VM 24/7 is great if you don't mind the massive performance penalty for doing it. If you want to do any kind of video editing, gaming, data processing, etc type of tasks then you'll extend the runtime by at least 2x if you run it in a VM instead of bare metal

    • @HikaruAkitsuki
      @HikaruAkitsuki 4 месяца назад

      @@user-jm8sy5ox2j Yea, there is indeed must on BM.
      But if you do research and gonna enter on a random website, it should be on VM.

  • @michaell7877
    @michaell7877 4 месяца назад

    I like your vids. Quite often it’s over my head. I would like to learn how as a beginner of trying to protect my pc from outside hacks. What do you suggest how I get started? Do you have a video on how to start out? Tyvm.

  • @FurryNonsense
    @FurryNonsense 4 месяца назад +87

    I wish there was a website that just said what the virus did (steal passwords, lock you out of your computer, etc) instead of a bunch of random codes and saying "yeah, this is bad, but we're not gonna say why this is bad"

    • @SmilerRyanYT
      @SmilerRyanYT 4 месяца назад

      Technically chatgpt might be able to do that now. I know I use AnyRun often and that has an option to summarise the whole thing.

    • @ChrisM541
      @ChrisM541 4 месяца назад

      False positives/negatives. This kind of analysis is similar to going to your doctor to get a diagnosis done on a health problem...it's very uncommon for a single test to conclusively point you to the answer. In PC forensic analysis you need to use multiple tools - and have a the correct level of skill yourself - in order to get to the bottom of any problem. A simple virus scanner needs a database of known 'signatures', and even then, they can still return false positives.
      You can reduce risk by following good practice, but you can never reduce that to zero, unfortunately. Even many closed systems are not risk-free.

    • @prof.poopypants8671
      @prof.poopypants8671 4 месяца назад +28

      Every security analyst wishes the exact same thing. Unfortunately, the reality is that a lot of malware performs activities on the system that are indistinguishable from user behavior (which can vary a LOT, depending on the user) or legitimate system processes. This makes it nearly impossible to provide a simple, concise, clear-cut answer in an automated way.

    • @Jordan-xy9hs
      @Jordan-xy9hs 4 месяца назад +3

      tell me how that would work, genius.

    • @superbaggio87
      @superbaggio87 4 месяца назад

      facts bruh

  • @jesusivanguerrazaldivar8303
    @jesusivanguerrazaldivar8303 4 месяца назад

    Wow ! new for me, thanks !

  • @a7xnexus
    @a7xnexus 4 месяца назад +1

    please make a video about famous software used in forensic

  • @m6yki_
    @m6yki_ 4 месяца назад +1

    Ahh yess, this is a great video. But TPS, how do we know what is a walware or what executable is a malware?

  • @shadowstorm657
    @shadowstorm657 4 месяца назад

    Amazing video thank you

  • @ripleyhrgiger4669
    @ripleyhrgiger4669 4 месяца назад

    PC Guy, is what canta is doing what cloud scanners do when you submit samples to them?

  • @Fortexik
    @Fortexik 4 месяца назад

    1:26 What do you use for iCloud Drive and Photos right in the explorer, please?

  • @wolfbrave4866
    @wolfbrave4866 4 месяца назад +4

    Imagine one day you sent a sample that could breach through the Sandbox environment. 🤔

  • @hoteny
    @hoteny 4 месяца назад

    My friend got his many accs stolen somehow, instagram shows no logs of ips while steam showed morocco. So, we think its his google chrome cookies and possibly account (but no session exists outside his own devices as we checked), not passwords though?, but maybe the pc itself was controlled? So anyway, since he cant format rn, we had to just use many tools you mentioned. We dont know if this is enough. Do you think we should do anything extra?

  • @gamereditor59ner22
    @gamereditor59ner22 4 месяца назад +1

    Nice!! Where can I get it?

  • @AgonTheFirst
    @AgonTheFirst 4 месяца назад

    Hello, how to analyze dll file. with cape... Example: Some software basically has nothing until they download a DLL file to perform their task.

  • @fernandohg225
    @fernandohg225 4 месяца назад

    Good to know !!!

  • @AlexAlex-869
    @AlexAlex-869 3 месяца назад

    Super cool!

  • @WilfredoCayabyab
    @WilfredoCayabyab 24 дня назад

    do you have anything for remote access tool analysis??

  • @mnageh-bo1mm
    @mnageh-bo1mm 4 месяца назад +1

    hmm what about something like that online automated sandbox but offline?

  • @guilherme5094
    @guilherme5094 4 месяца назад

    👍Thanks.

  • @maketank
    @maketank Месяц назад

    It would be very helpful if you posted the official links to the software you present across your videos. There are also lots of duplicates from other sources.

  • @tienatnguyen3412
    @tienatnguyen3412 4 месяца назад

    Do we have any ransomware Stop djvu online ID solutions ?

  • @moormoor4281
    @moormoor4281 4 месяца назад +1

    Any thing too help recover off lost data on android

  • @Thedude897
    @Thedude897 4 месяца назад +4

    This dude called the security channel is seriously plugging nord

  • @Agony.
    @Agony. 4 месяца назад

    Anyone know why I can't see youtubers profile pics on the home page, BUT it goes back to normal when I switch accounts?

  • @azizgoi2066
    @azizgoi2066 4 месяца назад

    How do we know if our computer is infected with malware stealer which is 100% FUD?

  • @TruthNTime
    @TruthNTime 4 месяца назад +9

    Off topic - I have had Comodo Antivirus installed for about 3 years and I want to uninstall it because it's taking up too much
    disc space. However, I read from a few different people that it's very hard to uninstall and it could also cause your system
    to start acting up because of residual files it leaves on your system after uninstalling it. Now I'm kind of wary to uninstall it.
    Is there any truth to what they are saying, or is there some sort of certain way to uninstall it so it doesn't cause problems?
    Please help...?

    • @HamedEmine
      @HamedEmine 4 месяца назад +1

      Bulk Crap Uninstaller (in short BCUninstaller or BCU) is very effective with "residual files", you might want to give it a try!

    • @marcfabricatore1506
      @marcfabricatore1506 4 месяца назад +3

      Reinstall Windows

    • @marcfabricatore1506
      @marcfabricatore1506 4 месяца назад

      @@absolutemadchad8637 Sometimes not even the Uninstaller from the company’s work which is why I recommended reinstalling

    • @aBc-123-XyZ
      @aBc-123-XyZ 4 месяца назад

      Try to remove the program in safe mode.

    • @duplicake4054
      @duplicake4054 4 месяца назад

      Just use the built-in uninstall tool. Go to add or remove programs > comodo > uninstall. I don't recommend uninstalling it though because it's really good.

  • @TheHeroHunterGarou
    @TheHeroHunterGarou Месяц назад

    Can you please scan crack game made by empress group because the emp.dl is detected by windows defender and i dont know if its safe or not

  • @projectzsavage
    @projectzsavage 2 месяца назад

    how to acces triage vms?

  • @rutera24
    @rutera24 4 месяца назад +4

    Мan, provide the links you show!

    • @SM-1010
      @SM-1010 4 месяца назад

      He can b extremely bland

  • @Skul1ybe
    @Skul1ybe 4 месяца назад +1

    Cool

  • @luddedagoat3599
    @luddedagoat3599 3 месяца назад +1

    Can i get infected from seeing the live sandbox and get it on my main pc.

  • @hakusu
    @hakusu 4 месяца назад

    Win 11 Home or Pro? :)

  • @lewiskelly14
    @lewiskelly14 4 месяца назад +1

    How can I trust you with that choice of sponsor and you don't bother to link the software and websites you talk about in the description?

  • @lolcorporation7308
    @lolcorporation7308 4 месяца назад +1

    Any.run and intizer

  • @ARabdurrahmanar
    @ARabdurrahmanar 4 месяца назад

    Nice🥰

  • @niamotullah99
    @niamotullah99 4 месяца назад

    Running Malware analysis tool into a Malware

  • @lewangandrover6441
    @lewangandrover6441 4 месяца назад

    🔥

  • @gir489returns2
    @gir489returns2 4 месяца назад +6

    If it contains a cryptominer, wouldn't they want it uploaded to a VM like this with a lot of hardware and ran? Seems like you're doing them a favor by running it at all.

    • @jackjack3358
      @jackjack3358 4 месяца назад +19

      If you think a crappy a few gigs RAM VM is capable of mining anything at all i have bad news to you, and VMs get generated and destroyed after each run so it can't do anything even if it was capable of mining

    • @user-jm8sy5ox2j
      @user-jm8sy5ox2j 4 месяца назад

      No, a VM is worst case scenario for any kind of malware attacker because generally you destroy the VM entirely after using it. A VM is typically sandboxed too so the malware has no chance to spread itself before the VM is destroyed too

  • @kkekang7
    @kkekang7 4 месяца назад +5

    Scamio by BitDefender?

    • @MTGeomancer
      @MTGeomancer 4 месяца назад

      I just copied and pasted a link from a phishing email in my spam folder to Scamio. It said there was nothing suspicious and probably not a scam.
      I wouldn't trust it, at all.

  • @CaptainMC554
    @CaptainMC554 4 месяца назад +1

    Leo

  • @kent_calvin
    @kent_calvin 4 месяца назад +1

    Were those bullets

  • @dismalbreadmaps
    @dismalbreadmaps 4 месяца назад

    Mandient is owned by Google

  • @onegenius6390
    @onegenius6390 4 месяца назад

    HEY, HOW ABOUT LINKS TO THESE TOOLS? 🤔

  • @RK-ly5qj
    @RK-ly5qj 4 месяца назад

    Madiant account were hacked on twitter xD

  • @lukehjo
    @lukehjo 4 месяца назад

    Process Monitor but worse.

  • @HazzyDevil
    @HazzyDevil 4 месяца назад

    I recommend any.run and joe’s sandbox as well

  • @lussor1
    @lussor1 4 месяца назад

    You got sponsored by the scummy Nord, but hopefully the viewers know that the VPN is bad

  • @robloxfan4271
    @robloxfan4271 4 месяца назад

    don't forget virus total

  • @adamion1993
    @adamion1993 4 месяца назад

    He has very good info but the vpn bullshit is annoying, I get that for a channel that is about cybersec there aren't many sponsor options but cmon a vpn doesn't do anything...encryption this encryption that literally every site is "peer to peer encrypted" or whatever their buzzword is it has never stopped anyone from doing anything ever...great advice but I see vpn ads everywhere and it's just disheartening

  • @KonuralpBalcik
    @KonuralpBalcik 4 месяца назад +11

    There are only 2 viruses in Windows, one is Edge and the other is Defender, no matter how much you delete and block them, they download and install themselves without asking anything. 🤣

  • @truefeelings7
    @truefeelings7 4 месяца назад

    i used this tool for manipulating my frnds not in bad way ... installed on his laptop 🤣🤣 7 years back 1st tool

  • @gta5anti-griefer882
    @gta5anti-griefer882 4 месяца назад

    🗿

  • @spypath5616
    @spypath5616 4 месяца назад

    Leoo

  • @Waryam2
    @Waryam2 4 месяца назад

    1 st comment

  • @freezeadq8748
    @freezeadq8748 3 месяца назад

    but any of these tools can anylize a simple encrypted .luac file...

  • @Waryam2
    @Waryam2 4 месяца назад

    1 comment

  • @Idkwholmao
    @Idkwholmao 4 месяца назад

    Leo :)

  • @Nick41622
    @Nick41622 4 месяца назад

    You don't need a third-party antivirus. It is far more important to update your PC & browser. This is your first line of defence. Windows security is all you need. You don't need none of this shit!

  • @godbacchus
    @godbacchus 4 месяца назад

    15 hackers have seen this video so far... lol 👎

  • @unguidedone
    @unguidedone 4 месяца назад

    if your looking at a executable then the tool of choice is ghidra. you can also use ida pro if on windows or reflector. if your looking at network activity then wireshark works fine.
    i am disappointed at the videos lack of technical ability and this is coming from someone who has very basic computer ability skills 2/10 lol.

  • @Epic-so3ek
    @Epic-so3ek 16 дней назад

    BOO nord vpn 👎👎👎

  • @logikaibukfenc4599
    @logikaibukfenc4599 4 месяца назад

    any.run

  • @janmillerty4528
    @janmillerty4528 4 месяца назад

    Leo

  • @ayush0477
    @ayush0477 4 месяца назад

    Leo

  • @xxXKogasaWe3dL0rd420Xxx
    @xxXKogasaWe3dL0rd420Xxx 4 месяца назад +1

    Leo

  • @abhilashsingh2576
    @abhilashsingh2576 4 месяца назад

    Leo

  • @arpitbala8042
    @arpitbala8042 4 месяца назад

    Leo

  • @saigoo6445
    @saigoo6445 4 месяца назад

    Leo

  • @slyant630
    @slyant630 4 месяца назад

    Leo

  • @MiniFishDabz
    @MiniFishDabz 4 месяца назад

    Leo

  • @NxVernxual
    @NxVernxual 4 месяца назад

    Leo

  • @WololoWololo2
    @WololoWololo2 4 месяца назад

    Leo

  • @Xsiayd
    @Xsiayd 4 месяца назад

    Leo

  • @fell_eagle5093
    @fell_eagle5093 4 месяца назад

    Leo