Nicely explained...any tool working knowledge will add more value
@aadvikcyber
3 ай бұрын
The investigations are always manual...automated tools may not give you the right results even if exists.
@naseerkhaja1323
6 ай бұрын
Excellent explanation Sir. Your language is also very fluent to understand
@aadvikcyber
6 ай бұрын
Thank you...
@DileepKumar-he9br
Жыл бұрын
Hi Anna Very nice explanation might be get a good mentor and make high-priority to do clips of EDR, XDR, MDR and SOAR technologies. Mightbe useful in future due to our market go-ahead these type of technologies.
@aadvikcyber
Жыл бұрын
Yes. I will do video on these technologies. Many of our subscribers asked about these defensive mechanisms. Thanks for commenting.
@srikanthsulge4971
3 ай бұрын
Clear cut explanation Thank you sir
@aadvikcyber
3 ай бұрын
Thank you
@shivanithigulla8172
Жыл бұрын
It was too clear and quick understandable Thank you Shiva
@aadvikcyber
Жыл бұрын
Thank you Shivani
@sivajiande2078
Жыл бұрын
Hi bro You done a good job way of teaching is toooo good plz do more vedios on cyber security (Soc )related Thank you
@aadvikcyber
Жыл бұрын
Thanks @sivaji
@madhukumarneelam5839
Жыл бұрын
Thank you so much for your valuable information sir.
hello sir nice explanation i wanted to know about how on alert is investigating in SIEM tool like q radar and Splunk
@aadvikcyber
6 ай бұрын
Investigation depending on the log recorded.
@kamrajs
Ай бұрын
Detailed Explanation ...
@aadvikcyber
Ай бұрын
@@kamrajs thanks
@arunkumarm.v7744
Жыл бұрын
Hi Sir thanks for the video please make the video SQL injection
@amjadalikhan1194
9 ай бұрын
Good explanation and cleared concepts
@aadvikcyber
9 ай бұрын
Thank you
@dasarisatish4669
Жыл бұрын
Hi sir I am recently placed as L1 Soc Analyst, I have to work with Proof point for email security Could you please make a vedio on proof point because your explanation is very much deep and very much informative 🙏
@aadvikcyber
Жыл бұрын
Hi andi...thanks for the kind words...Proofpoint is commercial tool. I dnt have account. If i do get access i will share the video.
@dasarisatish4669
Жыл бұрын
@@aadvikcyber 👍
@telugu-shorts604
Жыл бұрын
@@dasarisatish4669a company bro
@hemanthvennapusa4835
10 ай бұрын
How much experience bro ? need referrals .
@sreeranjanreddy
10 ай бұрын
Hi sir. Thankyou for this video.
@kittucookingwithfamilyvlog
2 ай бұрын
Really ver very thq sir
@aadvikcyber
2 ай бұрын
Thank you andi
@ChennaRaoA
27 күн бұрын
Hi sir, nice and useful information, can you please give any links for multipole urls checking in single site
@aadvikcyber
26 күн бұрын
Thanks andi
@chandu2946
Жыл бұрын
super explanation bro, it was crystal clear.
@aadvikcyber
Жыл бұрын
Thank you
@DeepthiDeepu-n9f
Жыл бұрын
Tq sir baga explanation echaru. Sir VAPT Tool medha videos cheiyandi sir plz.
@aadvikcyber
Жыл бұрын
Will try andi...thanks.
@sureshb123143
2 ай бұрын
Qrader offence analysis video cheyyandi
@aadvikcyber
2 ай бұрын
Its commercial tool andi...if i get a chance i will do.
@SANDY-RC
2 ай бұрын
Good explanation sir ,like who watched this in 2024
@aadvikcyber
2 ай бұрын
@@SANDY-RC thanks
@tejaswikuppala9841
Жыл бұрын
Nice explanation sir
@aadvikcyber
Жыл бұрын
thanks
@persispersis331
Жыл бұрын
super sir i want more videos from you sir
@bhaskarn6475
Жыл бұрын
Can you explain some top WAF signatures and how it is idenfied by WAF. Explain the functionality of WAF during such exploits with real-time example/logs.
@aadvikcyber
Жыл бұрын
The WAF will detect the payload supplied by attacker in Request. The payload might be XSS / SQL / OS / Code anything that contains the exploitable. With the defined pattern, WAF will drop the request and generate an alerts and notifications.
@kallusrihari9409
Жыл бұрын
Hi sir , thanks for the video. For a compromised email, all the SPF ,DKIM and dmarc will be passed , so on what basis we have to conclude a particular email was compromised?
@kotachaitanya
Жыл бұрын
Sir, how to wirite in domain dns for custom spf format syntax
@surirokz-zg4gb
Жыл бұрын
Hi plz explain smokescreen alerts in cyber security.
@dheerajraj7580
9 ай бұрын
thank you valuable information sir
@aadvikcyber
9 ай бұрын
Thanks andi
@bhaskarn6475
Жыл бұрын
How APT solutions works in real-time. examples like Cisco AMP in email gateway, Threat emulation in Checkpoint and Widlfire in PAN firewalls. (All these are Hybrid sandbox environment).
@aadvikcyber
Жыл бұрын
As per my understanding to catch APT, every service running in the endpoints or servers must be watched for a certain period. Monitoring means which port they are contacting and through which service, and how often it get connects to remote IP's all these factors consider and these sandboxing tools will figure out there is a APT. also it monitor what type of data is being transmitted during establishing connection with remote host.
@RoyalReddyYaparla
Жыл бұрын
Hi sir please explain google sign in integration
@435raja
Жыл бұрын
Sir ransomeware investigation meda chay ande videos
@aadvikcyber
Жыл бұрын
Will keep in priority list.
@achaitanya4349
Жыл бұрын
Malware Analysis Static and Dynamic kosam live examples tho cheppandi bhayya
@aadvikcyber
Жыл бұрын
Will try andi
@limbadrich5913
Жыл бұрын
Nice explanation
@aadvikcyber
Жыл бұрын
Keep watching...Thank you
@435raja
Жыл бұрын
If possible ciao AMP , stealth watch , Dark trace tools meda yamin videos chayande
@435raja
Жыл бұрын
Pls provide ur contact number sir
@aadvikcyber
Жыл бұрын
Will keep it in priority list.
@adimurthy5576
Жыл бұрын
Sir please do one video on how to create playbooks
@aadvikcyber
Жыл бұрын
Sure andi..
@adimurthy5576
Жыл бұрын
Thank you sir
@theandroid1031
Жыл бұрын
Sir epudu everything is ok in spf and dmarc and dkim but the mail is a phising mail so how can we identify that mail
@aadvikcyber
Жыл бұрын
Please check headers
@muraliajjada4276
4 ай бұрын
can you explain best cyber security course
@aadvikcyber
4 ай бұрын
The cyber security is dependent on your interest andi....here there are many domains available....you have choose which domain will match your existing capabilities. Based on that you can choose a course and relevant certificates
@pavhankumar1087
6 ай бұрын
Meru DKIM signature content ni secure chestumdhi ani chepparu kada content ni change cheyyalamte mundhu mail me daggara ki yela vastumdhi . Hackers yela chestaru content change
@aadvikcyber
6 ай бұрын
Hi Pavhan Kumar, good question. There are many ways attacker can modify the contents of the email. He can abuse the protocols, SMTP hacks, compromising mail servers etc..
@malasree4412
5 күн бұрын
Hi sir nice explanation need more videos, Could you please explain about sentinel one tool
@gansnraju5495
10 ай бұрын
Hai sir pls explain the fireEye hx and zscaler....
@aadvikcyber
10 ай бұрын
Hi andi i dnt have that tool access. These are commercial tools.
@vamsipallela6548
3 ай бұрын
Thank you sir for your information if we set up all options can we send 5000 mails per day
@aadvikcyber
3 ай бұрын
No.. You will be rate limited or ISP tag your IP as malicious IP and you may lose your IP reputation too
@ramakrishna270
Жыл бұрын
Super bro
@rajuc7068
4 ай бұрын
hi can you make a video on how to crack proxy ip address
@aadvikcyber
4 ай бұрын
Good question andi...will try to do video on this...
@aadvikcyber
4 ай бұрын
Hi Raju I have published a video on how to crack proxy ip address here you can watch it...kzitem.info/news/bejne/s6OF1Himj2aZnG0
@rajithanarukulla1452
Жыл бұрын
Sir please Do one vedio MX Tool box
@aadvikcyber
Жыл бұрын
What information you are looking andi in MX tool Box. It contains multiple parameters to exhibit the data about a target.
@rajithanarukulla1452
Жыл бұрын
Phishing mail analysis ki MX Tool box use chestharu kada adi clarity ga kavalandi ela cheyyali email header
@aadvikcyber
Жыл бұрын
Please click on the link given in description. We will have schedule call to clarify your doubts Andi... Thanks
@aadvikcyber
Жыл бұрын
@@rajithanarukulla1452 Please fill this google form to have personal consultation. forms.gle/TjBdNHm2jvFfAZpRA
@sonyvaishu7831
6 ай бұрын
E mail investigation 2nd part chptara ante inka konchem dept ga
@aadvikcyber
6 ай бұрын
Forensic investigation is the next step to deep dive to find out the more information.
@pavhankumar1087
6 ай бұрын
compromiser servers chala difficult sir for changing content
@aadvikcyber
6 ай бұрын
Compromising servers may be difficult for the noobs but for black hat experts its very very easy...try looking at Metasploit exploit codes...These are proven exploits.
@sairohithsai1016
9 ай бұрын
G8 explination
@aadvikcyber
9 ай бұрын
Thanks andi
@dineshvejandla9607
9 ай бұрын
tq
@aadvikcyber
5 ай бұрын
Welcome
@Markitmagic_27
4 ай бұрын
👏🏼
@sridharj3285
Жыл бұрын
👍
@sivakrishnahanumanthu4558
Жыл бұрын
anna I am interest to join cyber security course please help me
@aadvikcyber
Жыл бұрын
Hi @sivakrishna you can reach out to me by filling this google form forms.gle/TjBdNHm2jvFfAZpRA and also watch my video kzitem.info/news/bejne/toWIyJyjkZSfkm0
@sivakrishnahanumanthu4558
Жыл бұрын
anna mee phone number ivvandi anna
@aadvikcyber
Жыл бұрын
Hi you can send mail to aadvikcyber@gmail.com
@krishnakancharla2246
Ай бұрын
Explain soc analyst Video broo
@aadvikcyber
Ай бұрын
@@krishnakancharla2246 will do Andi
@sureshb123143
2 күн бұрын
Worthy information about phishing mails... And I need CS edr investigation process
@aadvikcyber
19 сағат бұрын
@@sureshb123143 thanks
@archithsanku1108
10 ай бұрын
Hi Bro, Thank you for the valuable content you provide for the YT users. Please address the Link between the SIEM and SOAR platforms. If possible take one usecase and explain the stuff.
@aadvikcyber
9 ай бұрын
Will keep it in priority list.
@manikantatelagamasetti2393
Жыл бұрын
Please explain time alert in ransom ware senario
@gayathrimakam894
Жыл бұрын
Hi andi, very clear about topic explanation and easy to understand also. meru zscalar proxy kudha explain chestara ?
@aadvikcyber
Жыл бұрын
Thanks for the comments... currently i do not have that tool access....will do video when i access it...
@PavanKumar-oq7ki
Жыл бұрын
Super explanation sir If possible try to give explanation about Cybereason tool Thx sir again
@aadvikcyber
Жыл бұрын
Thanks Pavan.
@rapolur9858
Жыл бұрын
Thank you Sir for nice video.
@limbadrich5913
Жыл бұрын
Sir please explain phishing mail or url analysis in any run environment
@aadvikcyber
Жыл бұрын
In this video we have covered it andi..
@PASUPULETISATISHKUMAR-p9s
Жыл бұрын
Hi sir please do vedio for about TAP TRAP?
@aadvikcyber
Жыл бұрын
Will keep it in priority list.
@SairamyaGudikandula
8 ай бұрын
great explanation sir thank you for explaining clearly
@aadvikcyber
8 ай бұрын
Thank you andi...
@sivakrishnahanumanthu4558
Жыл бұрын
offline or online classes kosam enquiry
@aadvikcyber
Жыл бұрын
Lets connect in mail, i will let you know the details.
@pruthviraj6603
Жыл бұрын
Super explanation aadvik garu
@aadvikcyber
Жыл бұрын
Thank you very much
@masabattuladurgaprasadu1249
4 ай бұрын
Annayya chala baga explain chesaru . Sorry one like button yee unnadhi
@aadvikcyber
4 ай бұрын
Thanks
@nishanthbabu3565
Жыл бұрын
Really beautifull explanation sir!! All the very best for these kind of videos.
@aadvikcyber
Жыл бұрын
Thank you so much Nishanth
@mr.encrypted214
Жыл бұрын
Sir pratical investigation videos cheyadi sir .
@aadvikcyber
Жыл бұрын
Due to youtube rules we cant do andi..
@rajavarapubharatkumar1855
Жыл бұрын
Hi Sir good explanation now i am confident on Email analysis and i need Dynamic malware analysis please do the video on Requested topic
@aadvikcyber
Жыл бұрын
Happy to know andi you got some good inputs from this video.
Пікірлер: 134