ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

ActiveEndpointInspectorSuite - Baseline-Driven Threat Hunting on Windows - Overview and Usage

Автор: Michał Sołtysik

Загружено: 2026-01-18

Просмотров: 106

Описание: Other content:    • Michał Sołtysik - Cybersecurity content  

Official website: https://michalsoltysik.com/

Michał Sołtysik is a Cybersecurity Consultant and Blue Team, Purple Team, and Red Team Analyst, bringing a broad and in-depth range of expertise to his cybersecurity practice.

He is also a Digital and Network Forensics Examiner, Cyber Warfare Organizer, and SOC Trainer, specializing in SOC operational capability and maturity development, network edge traffic profiling, and adversary emulation in EDR testing.

GitHub repository: https://github.com/MichalSoltysikSOC/...

In this video, I demonstrate Active Endpoint Hash & IP Inspector Suite, a Windows endpoint inspection suite designed to support baseline creation, threat hunting, and Blue Team operations.

0:00 - ActiveEndpointInspectorSuite correlates multiple endpoint perspectives in a single Windows GUI, including:

(1) Running processes with SHA-256 hashing.
(2) Network connections correlated with owning processes.
(3) Windows services and their binaries.
(4) Scheduled tasks expanded into individual actions.
(5) Common Windows autostart persistence mechanisms.

The suite supports optional reputation enrichment using VirusTotal and AbuseIPDB, allowing analysts to quickly enrich findings while maintaining a baseline-first workflow.

In this demo, I walk through:

4:56 - (1) Accepting API access notices, configuring session-only API keys, and understanding button behavior for baseline creation and detection of newly introduced items.
8:30 - (2) Creating a clean baseline across all modules.
9:40 - (3) Using Skip-based scanning to focus only on newly introduced artifacts.
15:33 - (4) Detecting processes, network connections, services, scheduled tasks, and autostart entries created by a pseudo-malware sample.
19:10 - (5) Exporting collected evidence and logs to CSV for further analysis and reporting.

21:32 - This tool is designed to assist with malware analysis, persistence hunting, and endpoint triage, while emphasizing that reputation data should never be used as the sole decision factor.

All tools shown in this video are free for personal and commercial use.

Contact:
Mail: [email protected]
LinkedIn:   / michal-soltysik-ssh-soc  
GitHub: https://github.com/MichalSoltysikSOC
Accredible: https://www.credential.net/profile/mi...
Credly: https://www.credly.com/users/michal-s...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
ActiveEndpointInspectorSuite - Baseline-Driven Threat Hunting on Windows - Overview and Usage

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Michał Sołtysik - How Web Protocol Weaknesses Enable Layer 7 DoS Attacks (ENG)

Michał Sołtysik - How Web Protocol Weaknesses Enable Layer 7 DoS Attacks (ENG)

Every Networking Concept Explained In 20 Minutes

Every Networking Concept Explained In 20 Minutes

Редакция Live: Москва без интернета, aмериканский AI против Ирана, «Возьми телефон, детка»

Редакция Live: Москва без интернета, aмериканский AI против Ирана, «Возьми телефон, детка»

Michał Sołtysik - Analiza głębokiej inspekcji pakietów - dlaczego typowe podejście nie wystarcza

Michał Sołtysik - Analiza głębokiej inspekcji pakietów - dlaczego typowe podejście nie wystarcza

NetSuite EPM for Transportation and Logistics: Demo by Myers Holum

NetSuite EPM for Transportation and Logistics: Demo by Myers Holum

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

How Hackers Steal Passwords: 5 Attack Methods Explained

How Hackers Steal Passwords: 5 Attack Methods Explained

Correction homework 3 Word (Headings in Words)

Correction homework 3 Word (Headings in Words)

ActiveEndpointInspectorSuite v1.1 - What's New? New Features and Improvements Overview

ActiveEndpointInspectorSuite v1.1 - What's New? New Features and Improvements Overview

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

The Strange Math That Predicts (Almost) Anything

The Strange Math That Predicts (Almost) Anything

Michał Sołtysik - Remcos RAT threat analysis on Windows including IEC 60870-5-104 traffic (ENG)

Michał Sołtysik - Remcos RAT threat analysis on Windows including IEC 60870-5-104 traffic (ENG)

🌹 Deep House Obsession 24/7 • Emotional Chill House Live Radio | Rose Afterhours

🌹 Deep House Obsession 24/7 • Emotional Chill House Live Radio | Rose Afterhours

Docker за 20 минут

Docker за 20 минут

A LOT OF desktop-related stuff & other Linux Weekly News

A LOT OF desktop-related stuff & other Linux Weekly News

LiveProcessMonitor - Baseline-Driven Historical Process and Network Monitoring on Windows - Overview

LiveProcessMonitor - Baseline-Driven Historical Process and Network Monitoring on Windows - Overview

Create AI Agents That Talk to Your Database | GCP + MCP Toolbox - Part # 1 / 2

Create AI Agents That Talk to Your Database | GCP + MCP Toolbox - Part # 1 / 2

Архитектура интернета и веба | Теоретический курс 2026

Архитектура интернета и веба | Теоретический курс 2026

Michał Sołtysik - Deep packet inspection analyses - why the typical approach is not enough (ENG)

Michał Sołtysik - Deep packet inspection analyses - why the typical approach is not enough (ENG)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]