Cybersecurity SOC Analyst Lab - Email Analysis (Phishing)
Video Overview & Insights
Cybersecurity SOC Analyst Lab session where we delve into the critical topic of email analysis specifically phishing. This video is designed for current and aspiring SOC analysts, cybersecurity professionals, and anyone interested in understanding how to investigate phishing emails.
Want to train like a real SOC analyst?
Check out the MYDFIR Forge
https://www.skool.com/mydfir/about
Blue Team Cyber Range: https://blueteamlabs.online/home/challenge/the-planets-prestige-e5beb8e545
HxD: https://mh-nexus.de/en/downloads.php?product=HxD20
goldmine
7Zip: https://www.7-zip.org/
Gary Kessler File Signatures: https://www.garykessler.net/library/file_sigs.html
This is super in depth and well explained, but how practical is this for handling real phishing situations?
Try out SquareX (FREE)
http://sqrx.io/mydfir_yt
Absolute masterclass.
ExifTool: https://exiftool.org/index.html
Build SOC Analyst skills in 90 days.
good content but the amount of ads kinda ruin it
Visit the MyDFIR SOC Community to find out how..
https://www.skool.com/mydfir
Great video. This the best video on youtube about this topic. Thank you for making it.
_________________________________
Looking to collaborate?
Great walk through. No time wasting and good explanation.
Feel free to email me at: inquiry@mydfir.com
_________________________________
thank you so much for a tremendous explanation
THE MYDFIR SOC ANALYST COURSE:
With 8 chapters and 30+ hands-on labs tailored to security operations, I am focused on transforming you into a standout SOC analyst. Beyond tools, you'll master the investigation process and uncover hidden details. Let's make a real difference together.
very helpful thank you so much.
▸Enroll here: https://academy.mydfir.com/p/soc
_________________________________
let me save this . too simplified
SIGN UP FOR FREE MENTORSHIP
Getting started in Cybersecurity is difficult and you don't have to do it alone.
Great learning.
If i am analyzing the email but can’t login our official rmail in vm and my file is in normal format then how to open in download option
Let me help you on your journey.
▸Sign up for FREE here: https://www.mydfir.com
thank you for sharing this level of content for free man, great job
_________________________________
RECOMMEND COURSES FOR BEGINNERS:
Thank You So Much!
Coursera Google Cybersecurity Program
Affiliate Link - https://imp.i384100.net/mydfir
Nice vid, however I wouldn't use online tools like Square to check files. Firstly - you might upload a malware to them. Even if harmless, I think this is not fair to upload such dangerous files to someone who does not expect them. Second - if the file is legit, you can exfiltrate your company data (possibly with PII or financial data) outside to the 3rd party. There was an incident in my company, where a guy uploaded xlsx attachments to AnyRun and they were publicly available for everyone. He wanted to be safe, but ended up in breaching data. I personally recommend using offline tools like OpenOffice.
Microsoft Cybersecurity Analyst Professional Certificate
Affiliate Link - https://imp.i384100.net/mydfir-MS
Man you made this video look and sound so tight
Coursera Google IT Support Professional Certificate
Affiliate Link - https://imp.i384100.net/mydfir-IT
Indepth email analysis. Thanks for sharing.
_________________________________
PRODUCTS TO HELP YOU GET STARTED
love it! good job man,
🗺️ 1-Year Cybersecurity Roadmap: https://mydfir.gumroad.com/l/roadmap
📘 The NO BS SOC Analyst Roadmap: https://mydfir.gumroad.com/l/SOC-Analyst-Roadmap
This was GREAT!!!
📄 Resume Template: https://mydfir.gumroad.com/l/Resume-Template
📑 Cover Letter Template: https://mydfir.gumroad.com/l/Cover-Letter-Template
sir i have a doubt . can we do this as a project ?
🎙️ Interview Questions: https://www.mydfir.com/interview
📚 Cybersecurity bookmarks: https://mydfir.gumroad.com/l/bookmarks
Man, rarely you stumble on gold. So much to learn here
_________________________________
🕒 TIMELINE
I like your video tutorial, it is very useful in providing information for me who is new to the world of SOC, I immediately subscribe to this link
00:00 - Intro
00:28 - Walkthrough
Amazing video. Thanks for the content. Im linking this video for our help desk (defacto first responders). Your breakdown of email headers which can be confusing made it seem simple.
16:28 - Recap
21:03 - Questions
this is very interesting session thanks! ( i personally used Microsoft Azure Header Analyzer )
_________________________________
FOLLOW ME ON SOCIAL MEDIA:
I thought being a part of DLP is boring until I saw this 😂 currently following through while I did my own investigation on a suspected inbound email. Thank you!
▸Instagram: https://instagram.com/MyDFIR
▸X: https://x.com/@MyDFIR
Bro what a fantastic explanation can i do this analysis on the host machine or vm machine
Disclaimer: All opinions in my videos are solely my own. Some links provided are affiliate links!
#cybersecurity #cybersecuritytrainingforbeginners #cybersecurityforbeginners #socanalyst #soc
I learned more from this video than my three years on the job as a SOC Analyst
More User Perspectives
How you install exiftools into windows powershel?
@trendypalace5161Love the way you dive into technical details of your SOC analysis/Blue team/Threat hunting videos. Keep it up.
@huyvuquang2041Good one. Got an opportunity to learn about many tools.
@venkateshnambi1576I opened it with Excel and file did not show me the Location description just only when i added file to the website you have provided. .. . wierd. Thanks for your hlelp.
@donalddd-q9mso many tools ! i just wish there was a single tool to do all of the analyzing with. Very good video!
@chapin2513Email Analysis well broken down. I need to safe this video . A big thanks to You Sir 🎉
@oliviangwa3473I must say this has to be the best walk-through I have seen on youtube, it was straight to the point and easy to follow. It was also how it would be done in the wild so I really like that I can clearly see your experience. I don't know how I would know to follow all of these steps without you explain the tools and where to start but maybe they go into detail in the exercise on where and how to follow each step? But, nevertheless great video.
Could you do another videos on one of the exercises from the website?
legend 🔥🔥
@amaljith710perfecto
@LNRD28Pure art, thanks for sharing, you got a new member.
@nofone-pl7khHey great instructor. Pls do you have a group or platform we can join to learn more 😮?
@henryfx8673hello. where from I can download phishing emails samples for practice?
@TsotneKverselava-dt1jnohh damn!
This is quite cool I also learened a lot of new stuff.
This what a Brillant video,
I’m just curious but can we use these tools to analyse the phishing emails we receive via our own email address ?
Obviously I will be using a virtual machine like you mentioned.
just observation: he said first couple of bytes but he copied first 4 bytes for file singnature
@Raviteja-le6mtNice Video!, Where can I find more examples of these email analysis?
@THANNOS1993Your course is wanderfull.
@diegomed3364very detailed if i may ask are these tools the tools used for email analysis or there other tools that can be used
@naturbenefitHi!
In The phishing analysis 2 couldn't find the last 3 answers
I tried but I couldn't. Can I get any help from your side? Especially in finding the URL analysis.
well-explained. Thanks for the video
@timcybI love your content, may you kindly do more content
@tumelomathe2444Co Can Da??? What kind of magic roundabout drug-induced swizzle-sticks is this?? 😂
@crowbar9566Wow! Wonderful. Thank you
@gina72725The One we didnt know we needed... FIRE content
@Dablaq2