ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

LiveProcessMonitor - Baseline-Driven Historical Process and Network Monitoring on Windows - Overview

Автор: Michał Sołtysik

Загружено: 2026-02-15

Просмотров: 97

Описание: Other content:    • Michał Sołtysik - Cybersecurity content  

Official website: https://michalsoltysik.com/

Michał Sołtysik is a Cybersecurity Consultant and Blue Team, Purple Team, and Red Team Analyst, bringing a broad and in-depth range of expertise to his cybersecurity practice.

He is also a Digital and Network Forensics Examiner, Cyber Warfare Organizer, and SOC Trainer, specializing in SOC operational capability and maturity development, network edge traffic profiling, and adversary emulation in EDR testing.

GitHub repository: https://github.com/MichalSoltysikSOC/...

0:00 - In this video, I demonstrate Windows GUI tools for baseline-driven endpoint process and network monitoring that capture a snapshot of running processes and connections, then continuously track post-baseline changes without discarding history. They correlate data in a unified view, with an extended version integrating optional Sysmon telemetry for deeper timeline visibility.

0:36 - Live Process Monitor:

(1) Creates a baseline snapshot of running processes using Windows-native mechanisms (WMI and system APIs).
(2) Collects detailed process metadata, including parent-child relationships, executable paths, command lines, and SHA-256 file hashes.
(3) Monitors process lifecycle events in real time, including process start and process termination.
(4) Enumerates active TCP and UDP network endpoints and correlates them with owning processes (PID-based ownership).
(5) Tracks network connection history per process, including first seen time, last seen time, and end time for TCP connections.
(6) Performs optional reverse DNS resolution for public remote IP addresses to provide basic contextual information.

1:54 - When Sysmon is installed, running, and properly configured, Live Process Monitor Plus enriches process and network data with additional low-level telemetry:

(1) Correlates Sysmon Event ID 1 (Process creation) with existing process rows.
(2) Correlates Sysmon Event ID 5 (Process terminated) to record precise termination times.
(3) Correlates Sysmon Event ID 3 (Network connection detected) with existing or newly observed network connections.
(4) Displays all observed Sysmon Event IDs (1, 3, 5) per process in a dedicated column.
(5) Adds explicit Sysmon-based timestamps for process creation and termination.

2:19 - To enable Sysmon-based enrichment features in Live Process Monitor Plus, Sysmon must be installed, running, and configured with a compatible configuration file that enables logging of Sysmon Event ID 1, 3, and 5.
SysmonConfigurator.exe can be used to configure Sysmon automatically.

The suite supports optional reputation enrichment using VirusTotal and AbuseIPDB, allowing analysts to quickly enrich findings while maintaining a baseline-first workflow.

In this demo, I walk through:

2:46 - (1) The use of widely adopted tools for monitoring system resources, including process execution and network connections (Process Hacker, System Informer, Process Explorer, and Process Monitor).
6:24 - (2) The use of SysmonConfigurator to automatically configure Sysmon for Live Process Monitor Plus.
8:14 - (3) Initial usage of Live Process Monitor and Live Process Monitor Plus.
10:27 - (4) Executing processes and generating network connections using a pseudo-malware sample.
16:16 - (5) Advanced usage of Live Process Monitor.
21:50 - (6) Advanced usage of Live Process Monitor Plus.
24:11 - (7) Exporting collected evidence and logs to CSV for further analysis and reporting.

26:35 - This tool is designed to assist with threat hunting, malware analysis, and broader Blue Team operations by preserving short lived executions and correlating them with network activity.

All tools shown in this video are free for personal and commercial use.

Contact:
Mail: [email protected]
LinkedIn:   / michal-soltysik-ssh-soc  
GitHub: https://github.com/MichalSoltysikSOC
Accredible: https://www.credential.net/profile/mi...
Credly: https://www.credly.com/users/michal-s...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
LiveProcessMonitor - Baseline-Driven Historical Process and Network Monitoring on Windows - Overview

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Чем занимается Цукерберг?

Чем занимается Цукерберг?

ActiveEndpointInspectorSuite v1.1 - What's New? New Features and Improvements Overview

ActiveEndpointInspectorSuite v1.1 - What's New? New Features and Improvements Overview

LeetCode 215 - Как ускорить решение в 1000 раз

LeetCode 215 - Как ускорить решение в 1000 раз

Automated Group Migration (MIM → SailPoint IIQ)

Automated Group Migration (MIM → SailPoint IIQ)

NetSuite EPM for Transportation and Logistics: Demo by Myers Holum

NetSuite EPM for Transportation and Logistics: Demo by Myers Holum

2 LLM produce 2 versions: Cold Google traffic VS Warm paid / email traffic

2 LLM produce 2 versions: Cold Google traffic VS Warm paid / email traffic

Michał Sołtysik - Cybersecurity content

Michał Sołtysik - Cybersecurity content

Michał Sołtysik - Analiza głębokiej inspekcji pakietów - wieloaspektowe spojrzenie z perspektywy SOC

Michał Sołtysik - Analiza głębokiej inspekcji pakietów - wieloaspektowe spojrzenie z perspektywy SOC

Create AI Agents That Talk to Your Database | GCP + MCP Toolbox - Part # 1 / 2

Create AI Agents That Talk to Your Database | GCP + MCP Toolbox - Part # 1 / 2

Dlaczego rząd Tuska nie zaskarżył Mercosur do TSUE? Jaki mają w tym interes? | A. Klarenbach

Dlaczego rząd Tuska nie zaskarżył Mercosur do TSUE? Jaki mają w tym interes? | A. Klarenbach

Nowe Apple, nowe DJI… i coś z IKEA

Nowe Apple, nowe DJI… i coś z IKEA

Michał Sołtysik - How Web Protocol Weaknesses Enable Layer 7 DoS Attacks (ENG)

Michał Sołtysik - How Web Protocol Weaknesses Enable Layer 7 DoS Attacks (ENG)

Linus Tech Tips is Back on Linux but is the Linus Curse Back Too?

Linus Tech Tips is Back on Linux but is the Linus Curse Back Too?

ActiveEndpointInspectorSuite - Baseline-Driven Threat Hunting on Windows - Overview and Usage

ActiveEndpointInspectorSuite - Baseline-Driven Threat Hunting on Windows - Overview and Usage

TableauOps Automation Workshop - CSV to Hyper

TableauOps Automation Workshop - CSV to Hyper

【OpenAI公式】Codexを使いこなす方法!プロンプト4要素やコンテキストエンジニアリングの基礎を解説

【OpenAI公式】Codexを使いこなす方法!プロンプト4要素やコンテキストエンジニアリングの基礎を解説

Michał Sołtysik - Czy sektor publiczny toczy równą walkę?

Michał Sołtysik - Czy sektor publiczny toczy równą walkę?

Michał Sołtysik - Deep packet inspection analyses - why the typical approach is not enough (ENG)

Michał Sołtysik - Deep packet inspection analyses - why the typical approach is not enough (ENG)

Представляем Digital Optimus: смелое новое видение Илона Маска в области искусственного общего ин...

Представляем Digital Optimus: смелое новое видение Илона Маска в области искусственного общего ин...

Michał Sołtysik - Remcos RAT threat analysis on Windows including IEC 60870-5-104 traffic (ENG)

Michał Sołtysik - Remcos RAT threat analysis on Windows including IEC 60870-5-104 traffic (ENG)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]