Cyberspatial
Cyberspatial
  • 41
  • 8 808 948
How to Find Out What Suspicious Connections Your Computer Makes When Going to a Website.
Whenever you visit a website, your browser could be making hundreds of connections to other URLs in the background. These connections could be loading media, displaying ads, or deliver potentially malicious code. This video will show you how to analyze all the connections your browser makes when you access a website.
You’ll learn how to use the browser’s developer tools to record website network traffic, extract URLs using a Powershell script, and analyze any suspicious links with VirusTotal. This workflow is especially useful for incident responders or security researchers who need to understand the various connections a website makes when people connect to it.
00:00 Why You Should Analyze Website Connections
00:44 Using Developer Tools to Record Network Activity
01:36 Analyzing Network Connections Made by a Website
02:38 Individual URL Analysis With Virus Total
03:33 How to Download and Parse HAR Files
04:04 How to Extract URLs from a HAR File in Windows with PowerShell
05:58 What Are The Upsides of using Developer Tools to Record Network Traffic?
06:24 Downsides of Using This Method?
The PowerShell script shown in the video and scripts for MacOS and Linux are available here:
github.com/cyberspatiallabs/idle_computer
👍 LIKE AND SUBSCRIBE 👏
#cyberspatial​ #digitalforensics #malwareanalysis
Get next-gen PCAP visualization and analysis at
cyberspatial.com
Переглядів: 2 586

Відео

Cyberspatial Updates and the Future of this Channel (Big News!)
Переглядів 2,1 тис.Місяць тому
Hey guys, big news at Cyberspatial. It's been a really long time since I've posted any videos, mostly due to working on a new kind of visual network monitoring and visibility tool called Teleseer. There's a ton of work involved and simply not enough time to build a company and a UA-cam channel at the same time. That's why I'll be introducing a special someone to the channel who will be a new fa...
What Makes Israel So Good at Hacking?
Переглядів 1,9 млнРік тому
Ever wonder what makes Israel so good at hacking? How does a small country like Israel consistently produce some of the world’s best hackers and cybersecurity practitioners? What does it take to make it to elite military cyber units like Unit 8200 and Unit 81? The secret is people, not technology. Israel’s cyber success lies in its human capital development system. Everything from assessing and...
How to Learn Cyber Security Faster In 5 Simple Steps
Переглядів 248 тис.Рік тому
One of the hardest things about learning cyber security is there’s no formal roadmap and a million different places to start. The more topics you explore, the more rabbit holes you discover. It’s really intimidating. How do you manage this? It all starts with having a strategy and structured plan for learning. This way, you can stay on track and make consistent progress. Here are five simple st...
This Powerful Cyber Security Tool Will Save You Hours of Work Every Day
Переглядів 26 тис.2 роки тому
Network mapping is one of the hardest things to do in cyber security. It’s manual, tedious, and there aren’t any good tools out there to do it. Until now. Introducing Teleseer, a network mapping platform that can save your hours of work every day. Whether you’re doing threat hunting, incident response, threat intelligence, penetration testing, or just sysadmin work, you need to Sign-up now at t...
How Building a Cyber Security Startup Ruined My Life (why I’d do it again!)
Переглядів 98 тис.2 роки тому
Ever thought of building a cyber security startup? I did. And it almost ruined my life (in a good way). Here’s some of my lessons learned along the way: Life becomes much more stressful. This is because you go from wearing one hat to wearing a dozen hats. Except you can actually only work on one thing at a time. You need to prioritize tasks based on the amount of time it will take to finish and...
How To Pass a SANS Cyber Security Exam in 5 DAYS (No books…)
Переглядів 124 тис.2 роки тому
Passing a cyber security certification takes work. Hard work. But what if you’re short on time? Like REALLY short? I passed a cyber cert from SANS in under 5 days just to see if it could be done. And here’s what I learned: SANS cyber training and GIAC certs are two gold standards in cyber security. Weighing in over $7000, they’re what employers look for when hiring cyber talent. Failure can be ...
Why VPNs are a WASTE of Your Money (usually…)
Переглядів 1,4 млн3 роки тому
Commercial VPNs probably hurt your privacy and security more than they help. Behind the layers of marketing sits a darker side of the industry. Ask yourself questions like: - Why trust a VPN company and their ISP over my own? - Who’s actually running these companies? - Why so many VPN ads on UA-cam? - What’s up with all the review sites? VPNs are designed to transport devices from a network of ...
Cyber Defense Tips to Rival the NSA
Переглядів 35 тис.3 роки тому
Cyber defense is much more than security. “Security” can be misleading since it encourages people to think in terms of secure or insecure. This way of thinking leads to an overemphasis on preventative measures. Just like the human body, you need many more layers than that. A good cyber defense will also focus on deception, detection, and response in addition to prevention. In this video, we cov...
How to Fail a Cybersecurity Interview
Переглядів 33 тис.3 роки тому
Want to win the cybersecurity interview? Learn how to fail first. In a recent interview with Stephen Semmelroth, he shared excellent advice on helping cyber professionals ace their job interviews. In this video, we recap some key takeaways but flipped to reasons why people fail. Some of the reasons why include: - Not conveying a deep and broad understanding of the cyber domain when answering te...
How to Prepare for a Cyber Security Interview (w/ Stephen Semmelroth)
Переглядів 51 тис.3 роки тому
The interview is one of the most crucial parts of applying for a cyber security position. It’s your window of opportunity to start or advance your career. You’ve probably already heard it all: make eye contact, look sharp, research the company... But interviewing for a cyber security position is a little bit different. The technical gap makes it hard for HR professionals to find talented candid...
Life of a DevSecOps Engineer (w/ Aras "Russ" Memisyazici)
Переглядів 47 тис.3 роки тому
Russ Memisyazici is a DevSecOps engineer and cloud architect with 30 years experience in IT and cyber security. From coaching US CyberPatriot teams to building the Virginia Cyber Range, he's got quite the colorful career. By-the-way, it’s pronounced: my-mish-yah-zuh-juh. In this interview, Russ shares his knowledge on: - Cloud risks - Future cloud technologies - Thoughts on cyber certifications...
Mask Your Emails with SimpleLogin (w/ Son Nguyen)
Переглядів 24 тис.3 роки тому
Son Nguyen used to work for an advertising company tracking users online. Now he builds privacy-enhancing tools like SimpleLogin to protect your online accounts. In this video, Son walks us through his email service and shares his journey on becoming a web app developer. SimpleLogin is an open-source, masked email service that you can self-host. Unlike many other services, it generates email al...
How To Deal With Arrogant People in Cyber Security
Переглядів 22 тис.3 роки тому
Intellectual arrogance is a common theme you’ll often encounter in tech and cyber security. If you’ve ever had an idea abruptly dismissed or been roped into a technical argument, you’ve probably experienced intellectual arrogance. Let’s face it: these experiences are quite unpleasant. In domains dominated by physical prowess, it’s common to see displays of hubris and “one-upping” opponents at e...
What is Cyber Insurance? (w/ Daniel Kasper)
Переглядів 17 тис.3 роки тому
You can get insurance for about anything. From homes, your health, to even a singer’s voice, cyber insurance is a newer but growing market. Cyber insurance is a type of property and liability insurance created by cyber risks. When you think about cyber security risk, hacking usually comes to mind. This might be data breaches or denial-of-service attacks. But what about the second and third-orde...
What Is the Future of Cyberspace? (w/ Roderick Jones)
Переглядів 10 тис.3 роки тому
What Is the Future of Cyberspace? (w/ Roderick Jones)
RunCode: Practical Programming Challenges (w/ Josh Rykowski)
Переглядів 9 тис.3 роки тому
RunCode: Practical Programming Challenges (w/ Josh Rykowski)
Real Hacking: Learn The Cyber Kill Chain
Переглядів 94 тис.3 роки тому
Real Hacking: Learn The Cyber Kill Chain
​Why Good SOC Analysts Know Offense & Defense
Переглядів 13 тис.3 роки тому
​Why Good SOC Analysts Know Offense & Defense
Life of a SOC Lead (w/ Alberto Rodriguez)
Переглядів 35 тис.3 роки тому
Life of a SOC Lead (w/ Alberto Rodriguez)
Is Coding Important for Cyber Security?
Переглядів 344 тис.3 роки тому
Is Coding Important for Cyber Security?
Why Cyber Security is Hard to Learn (Tips For Success!)
Переглядів 685 тис.3 роки тому
Why Cyber Security is Hard to Learn (Tips For Success!)
Cyber Crime and Hunting Cyber Criminals
Переглядів 51 тис.3 роки тому
Cyber Crime and Hunting Cyber Criminals
How North Korea Conducts Cyber Operations
Переглядів 52 тис.3 роки тому
How North Korea Conducts Cyber Operations
How to Redirect Text Input/Output in Linux (cat, tee)
Переглядів 15 тис.3 роки тому
How to Redirect Text Input/Output in Linux (cat, tee)
How to Become a Red Team Operator
Переглядів 62 тис.3 роки тому
How to Become a Red Team Operator
OSINT: Sharpen Your Cyber Skills With Open-source Intelligence
Переглядів 176 тис.3 роки тому
OSINT: Sharpen Your Cyber Skills With Open-source Intelligence
What's It Like As A Red Team Operator? (w/ Chris M.)
Переглядів 103 тис.3 роки тому
What's It Like As A Red Team Operator? (w/ Chris M.)
How to Use Command-Line Reference Tools in Linux (apropos, which, whereis, whatis)
Переглядів 6 тис.3 роки тому
How to Use Command-Line Reference Tools in Linux (apropos, which, whereis, whatis)
Why You Need a DIFFERENT EMAIL Address for Every Account
Переглядів 93 тис.3 роки тому
Why You Need a DIFFERENT EMAIL Address for Every Account

КОМЕНТАРІ

  • @TheChemisch
    @TheChemisch 23 години тому

    Previously the only use case for 99% of people is torrenting. Now with Geolocking of streaming services and the new option from many mainstream VPN providers you can acquire private IP's not shared IP's. Which basically allows someone tech literate enough to setup means of sharing geolocked streaming services to multiple households

  • @Berley_1234
    @Berley_1234 День тому

    what makes Israel so good at hacking? BILLIONS $$$$ from the USA

  • @shynbomx2884
    @shynbomx2884 День тому

    this video is really good about writing and delivering, thanks for making it!

  • @Cybersader
    @Cybersader День тому

    Missed these types of tutorials. You're not following the hype or the job recruitment stuff and showing things that can be used everywhere. Love this

  • @sbowesuk981
    @sbowesuk981 4 дні тому

    11:25 - 99% of people watching this video should categorically skip self-hosted password managers and instead go with a reputable company like Bitwarden, 1Password, etc. The notion of self-hosting being "more secure" depends massively one one thing, the human being doing the self-hosting knowing EXACTLY what they're doing. If that's not the case, then self-hosting is arguably the WORST solution, as the risk of leaking or losing everything becomes much higher than a decent password management company screwing up. This video pushing random people to self-host and avoid cloud based solutions is actually poor form, because it overlooks that most people simple aren't qualified to pull it off safely.

  • @tech4free501
    @tech4free501 4 дні тому

    "Stressing out if the targets they helped bomb were terrorists or Palestinian families" Then a video is posted of an Israeli soldier slapping a poor 8 years old kid :). Pure propaganda channel.

  • @danpetrescu4915
    @danpetrescu4915 9 днів тому

    logical conclusion IS THEY DECIDE THIS WAR IN GAZA .

  • @clyde-lx5ql
    @clyde-lx5ql 10 днів тому

    Oh my gosh !! He is finally BACK !! Thank you God eventhough I'm agnostic. I thought you got kidnapped by israeli's cybersec unit or russian's hackerz group so they can milk out your brain to distillate your precious knowledge.

  • @master2000b
    @master2000b 11 днів тому

    This is my first time bumping into your video. Awesome content. My I ask what video application you're using to create your contents?

  • @andrewcolville4551
    @andrewcolville4551 11 днів тому

    We're those lights Google

  • @DrewPicklesTheDark
    @DrewPicklesTheDark 11 днів тому

    When everyone started shilling them at the same time is when I became skeptical.

  • @holymemoly3833
    @holymemoly3833 11 днів тому

    simple answer to the title question : US tax money

  • @Loicmartins
    @Loicmartins 11 днів тому

    Thanks for your sharing!

  • @Jo_Wick
    @Jo_Wick 11 днів тому

    Am I the only one to notice that the poem at 9:06 has a different indentation at line 5?

  • @cassiuscartland
    @cassiuscartland 12 днів тому

    The only reason I still pay $200 a year for Nord VPN is so I can get around school internet blocks and I cant bother to set up a local VPN

  • @Trumpvicitm
    @Trumpvicitm 12 днів тому

    This video didn’t age well lol

    • @---------c5741
      @---------c5741 4 дні тому

      Yes it did and israel is about to destroy Hamss lmfao just goes to show you how important a countries cybersecurity is

  • @Hudifa-mq5bd
    @Hudifa-mq5bd 12 днів тому

    free Palestine

  • @allancopland1768
    @allancopland1768 14 днів тому

    American money and tech.

  • @blitzio
    @blitzio 14 днів тому

    Exciting stuff, could you please also cover topics for regular people to adopt the best practices in cyber security for their daily lives? Especially for our families to educate them, etc on topics like antivirus, password managers, device/computer security, home network security, etc

  • @reefhound9902
    @reefhound9902 16 днів тому

    sites will eventually block anondaddy, too.

  • @ImplosiveCatt
    @ImplosiveCatt 16 днів тому

    Tell that to people in China, Iran and Saudi Arabia.

  • @zer0875
    @zer0875 16 днів тому

    Why couldn't they see 7 Oct then?

  • @IndusValleyCorporation
    @IndusValleyCorporation 16 днів тому

    🇮🇳🤍🇮🇱

  • @user-ci4wd4nd4j
    @user-ci4wd4nd4j 16 днів тому

    מגניב👍

  • @pawanneupane6870
    @pawanneupane6870 17 днів тому

    Why do I feel like this is John's voice???

  • @kaganburakboz3793
    @kaganburakboz3793 18 днів тому

    although it is an propaganda video it eventually back fired after seeing 7th October Event. Being one of the elite intelligence and hacking service and even tough you cannot prevent October 7th. It is , with the kindest words, bullshit :)

  • @caryhooper
    @caryhooper 18 днів тому

    Nice work on the video Ricky!

  • @hamzamoussaid8895
    @hamzamoussaid8895 19 днів тому

    so they wanted 7th Oct to happen, you can't convince me otherwise

  • @samsmusichub
    @samsmusichub 20 днів тому

    Very cool.

  • @ijay796
    @ijay796 21 день тому

    Clever and intelligent as Osho stated; and this is why they are also hated...

  • @i_bander83
    @i_bander83 21 день тому

    الامن السيبراني ببساطه هو التدخل في مشيئة الاله الرب الانسان يريد الوصول الى المشيئه الالهيه و القدر الألاهي الامن السيبراني فكره شيطانيه

  • @PspkCz
    @PspkCz 21 день тому

    12.30 dont use internet

  • @davidhinkley
    @davidhinkley 22 дні тому

    Another famous (previously) fake snake oil salesman was Trump's grandfather. He was kicked out and sent back to Germany for it. Sadly he made his way back at some point.

  • @phillipsjuan3871
    @phillipsjuan3871 23 дні тому

    Whats the VPN he says is trustable??

  • @exp037a
    @exp037a 24 дні тому

    Im doing the google certificate program and im learning all of this.

  • @tjmcguire9417
    @tjmcguire9417 24 дні тому

    You have done a very good job educating people on this situation. I have been in the software business a very long time and did not know some of this. Perhaps it boils down to this. VPNs can be useful. They are no guarantee of privacy and security but you should still pick one that has a good track record. Use it as needed....because many ISPs will throttle you the moment you enable it. 5 eyes? I laugh. A million eyes. Still. Anytime you can be more private is worth it.

  • @reepusvanguard
    @reepusvanguard 24 дні тому

    how do you talk about vpns and not talk about pirating exept for not reccomending pirated software? mf why do you think i have a vpn?

  • @DroisKargva
    @DroisKargva 24 дні тому

    He was talking about Mullvad VPN btw. If anyone wants to check just sum B:J column cell numbers and order results in ascending order. Then first one is the best ranking 😅 Mullvad got incorporated on 2009

  • @wingit7335
    @wingit7335 25 днів тому

    In reality your information, although seemingly very valuable is absolutely useless to the average user. They're never gonna do all this stuff, but they MIGHT start using a small program where all they have to do is paste some text. I loved the Powershell coding, that was beautiful. I realise it's difficult for you to further people's interest but i would say you have genuinely broken the ice and i feel a lot fo people will hang on for more. I'm one of them. I will be watching your future videos about this. We both know it wouldn't be that hard to create a script / program or app which mimmicks VirusTotals' actions and throws up a green or red flag instantly after pasting in a website address. This will be fascinating to see when somebody eventually does it, maybe it will be you. It won't be me. i appreciate your efforts. You've really inspired me and absolutely peaked my interest and taken me back to the good old days of 20 years ago when i was well into this kinda stuff. Thank you so much.

  • @xuedi
    @xuedi 25 днів тому

    Most of the browser connections are harmless, more interesting is the systems traffic, no virus will use the browser to communicate back, so i dont think web tools is a great source. Installing an IDS or sniffer/monitor on the router is the only way to get usefull oversight onto traffic ...

  • @sundayigetimothy1121
    @sundayigetimothy1121 25 днів тому

    Nice one have use virus total to stop different suspicious I.P and website on my website. Nice one, I love technical things

  • @smnomad9276
    @smnomad9276 25 днів тому

    This was a very informative video. Thanks a lot man, keep the quality content coming!

  • @apollomedia7210
    @apollomedia7210 25 днів тому

    Man I like these kind of technical tutorials.

  • @creativecatalyst777
    @creativecatalyst777 26 днів тому

    That's a lot to do. Can't we just run a virus app?

    • @wingit7335
      @wingit7335 25 днів тому

      I actually laughed out loud when i read your comment. I'm still chuckling as i'm typing this. I think you are spot on. For some Dev there's a fortune to be made.

  • @jasonme3557
    @jasonme3557 26 днів тому

    yo this is great. Looking forward in the next

  • @bryantonojeta5064
    @bryantonojeta5064 26 днів тому

    Nice Loved this.. was able to follow along even modified the ps code on the fly. TY Sir.

  • @davewoods2835
    @davewoods2835 26 днів тому

    lov it TY keep It up

  • @infradragon
    @infradragon 26 днів тому

    ublock origin has a logger that lets you sort and filter requests by type, and its a really nice interface for looking into websites like that

  • @classicpcgaming4194
    @classicpcgaming4194 26 днів тому

    1:13 Is this some sort of joke I don’t get? What’s with all the f’d up faces in all but the penultimate photo?

  • @dawoodch2286
    @dawoodch2286 27 днів тому

    What is best language to learn python or Java for Cyber security