Detect Hackers & Malware on your Computer (literally for free)

preview_player
Показать описание

Free Cybersecurity Education and Ethical Hacking with John Hammond
🔥 YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe!
Рекомендации по теме
Комментарии
Автор

Step 1: Download and execute a binary from a random website I've never heard of. xD

sync
Автор

A word of advice: Be careful who you trust. Even a software promising your security can be a disguised bad actor. (Not saying aurora is one of those!)

maxde
Автор

best way to not get hacked is to live in the woods without any technology

FIXm
Автор

Bruh John's icon sizes getting progressively bigger in every video like the sheriff's hat in scary movie is killing me

Rennu_the_linux_guy
Автор

Ah! Thank you for this. This won you a subscription from me because this is a great way for me to dive deeper into cyber security and discover more. I appreciate this. New student of Cybersecurity Technician so this will be of incredible use.

teringNothings
Автор

Hey just want to say thank you for taking the time and going step by step on not just this but how to open a zip file, us noobs gotta start somewhere, thanks again 😊

myekuntz
Автор

A little bit of click bait and knowledge not simplified for the public viewers who is really trying to find solutions. But great work from the ones who understands.

EliteTech
Автор

Looks interesting but my first thoughts are that the plain text yml based signatures are vulnerable, they should be locked in an encrypted vault, otherwise an attacker can just change the rules before running their attack on a machine and then ta da no alert pops up.

CC-Pi
Автор

Every software you install is increasing your attack surface. It would actually be better to show signs of malware infection rather than installing a magical black box to do it.

youreale
Автор

"it's not a matter of if, but when." ancient cybersecurity proverb.

itsallasimulationman
Автор

Great Job I absolutely love it I already have something flagged that antivirus did not flag and I think this is one of the ways to get familiar with how ones system works even from a beginners level of understanding.

floridapenguin
Автор

Most of famous software companies are in fact selling user data to aggregators. I know this because I bought these when I worked in a famous consulting co😢😅

holetarget
Автор

Interview reply from employer when I inquired about expectations: "No incidents." I almost popped off, "How do you know you aren't in one now?" heh

xCheddarBbx
Автор

Thank you, John, for sharing content like this with us.

FuzzerHash
Автор

It's quite confusing to determine the number of EDR/SIEM/SOAR tools available, as there are numerous options such as Splunk, Aurora, Corelight, Zeek, MS Sentinel, Snort, Wireshark, Datadog, Graylog, Security Onion, ELK, LogRhythm, and Google Chronicle. As a beginner, it can be overwhelming to choose the right tool. Can someone please explain the differences between these tools and offer guidance on which one I should focus on?

zuberkariye
Автор

Too complicated for the general public including me but thanks for bringing this to our attention.

TC-hlws
Автор

You always find the coolest tools and resources! Awesome stuff, John, as always!

sagenorris
Автор

John I think you're trying to appeal to the "average user" but the average user doesn't have the technical knowledge for this stuff. I didn't realize until scrolling through the comments how many people outside the industry are watching these videos. People in the industry know you're a legend and take you seriously. Alot of your viewers right now dont even know who you are. I'm honestly not sure how they found this video. They probably got a virus and searched "how to know if i got hacked" lol. Anyways, you're great. So is the content. We appreciate it! Keep it up!

aDaily
Автор

Great stuff! Thank you! I am very excited about your idea to have more content exploring Aurora EDR. Can't wait 🙂

itssoaztek
Автор

My internal sigma rule detects adware.

megsman