free web page hit counter
🛡️
Copyright Notice: This video is officially sourced and embedded from YouTube. For all copyright inquiries, reports, or removals, please contact YouTube's legal team here.
MyDFIR

MyDFIR

81,100 subscribers

👁 65,499 views

Cybersecurity SOC Analyst Lab - Email Analysis (Phishing)

Video Overview & Insights

Cybersecurity SOC Analyst Lab session where we delve into the critical topic of email analysis specifically phishing. This video is designed for current and aspiring SOC analysts, cybersecurity professionals, and anyone interested in understanding how to investigate phishing emails.

Want to train like a real SOC analyst?

Check out the MYDFIR Forge
https://www.skool.com/mydfir/about

— @MyDFIR

Blue Team Cyber Range: https://blueteamlabs.online/home/challenge/the-planets-prestige-e5beb8e545

HxD: https://mh-nexus.de/en/downloads.php?product=HxD20

goldmine

— @azizmirichkou765

7Zip: https://www.7-zip.org/

Gary Kessler File Signatures: https://www.garykessler.net/library/file_sigs.html

This is super in depth and well explained, but how practical is this for handling real phishing situations?

— @jojoma2248

Try out SquareX (FREE)

http://sqrx.io/mydfir_yt

Absolute masterclass.

— @gottabepablo

ExifTool: https://exiftool.org/index.html

Build SOC Analyst skills in 90 days.

good content but the amount of ads kinda ruin it

— @theragnaroksea

Visit the MyDFIR SOC Community to find out how..

https://www.skool.com/mydfir

Great video. This the best video on youtube about this topic. Thank you for making it.

— @hassanmuse3930

_________________________________

Looking to collaborate?

Great walk through. No time wasting and good explanation.

— @nicholaspratt1786

Feel free to email me at: inquiry@mydfir.com

_________________________________

thank you so much for a tremendous explanation

— @michaellasambouw

THE MYDFIR SOC ANALYST COURSE:

With 8 chapters and 30+ hands-on labs tailored to security operations, I am focused on transforming you into a standout SOC analyst. Beyond tools, you'll master the investigation process and uncover hidden details. Let's make a real difference together.

very helpful thank you so much.

— @rawansuli

▸Enroll here: https://academy.mydfir.com/p/soc

_________________________________

let me save this . too simplified

— @cybersecurityornothing

SIGN UP FOR FREE MENTORSHIP

Getting started in Cybersecurity is difficult and you don't have to do it alone.

Great learning.

If i am analyzing the email but can’t login our official rmail in vm and my file is in normal format then how to open in download option

— @lokendraarjariya

Let me help you on your journey.

▸Sign up for FREE here: https://www.mydfir.com

thank you for sharing this level of content for free man, great job

— @Ak4tami

_________________________________

RECOMMEND COURSES FOR BEGINNERS:

Thank You So Much!

— @imankasthuri3438

Coursera Google Cybersecurity Program

Affiliate Link - https://imp.i384100.net/mydfir

Nice vid, however I wouldn't use online tools like Square to check files. Firstly - you might upload a malware to them. Even if harmless, I think this is not fair to upload such dangerous files to someone who does not expect them. Second - if the file is legit, you can exfiltrate your company data (possibly with PII or financial data) outside to the 3rd party. There was an incident in my company, where a guy uploaded xlsx attachments to AnyRun and they were publicly available for everyone. He wanted to be safe, but ended up in breaching data. I personally recommend using offline tools like OpenOffice.

— @KapitanZbik2138

Microsoft Cybersecurity Analyst Professional Certificate

Affiliate Link - https://imp.i384100.net/mydfir-MS

Man you made this video look and sound so tight

— @SavageCourtney

Coursera Google IT Support Professional Certificate

Affiliate Link - https://imp.i384100.net/mydfir-IT

Indepth email analysis. Thanks for sharing.

— @unknownStoryTeller88

_________________________________

PRODUCTS TO HELP YOU GET STARTED

love it! good job man,

— @AbhijeetPawar-xo2sb

🗺️ 1-Year Cybersecurity Roadmap: https://mydfir.gumroad.com/l/roadmap

📘 The NO BS SOC Analyst Roadmap: https://mydfir.gumroad.com/l/SOC-Analyst-Roadmap

This was GREAT!!!

— @daniellecavallari7226

📄 Resume Template: https://mydfir.gumroad.com/l/Resume-Template

📑 Cover Letter Template: https://mydfir.gumroad.com/l/Cover-Letter-Template

sir i have a doubt . can we do this as a project ?

— @gopikaselvam506

🎙️ Interview Questions: https://www.mydfir.com/interview

📚 Cybersecurity bookmarks: https://mydfir.gumroad.com/l/bookmarks

Man, rarely you stumble on gold. So much to learn here

— @UnrealOpsYt

_________________________________

🕒 TIMELINE

I like your video tutorial, it is very useful in providing information for me who is new to the world of SOC, I immediately subscribe to this link

— @furqonifurqoni6450

00:00 - Intro

00:28 - Walkthrough

Amazing video. Thanks for the content. Im linking this video for our help desk (defacto first responders). Your breakdown of email headers which can be confusing made it seem simple.

— @mickbyrne9

16:28 - Recap

21:03 - Questions

this is very interesting session thanks! ( i personally used Microsoft Azure Header Analyzer )

— @danielgx83

_________________________________

FOLLOW ME ON SOCIAL MEDIA:

I thought being a part of DLP is boring until I saw this 😂 currently following through while I did my own investigation on a suspected inbound email. Thank you!

— @_dizzylock00

▸Instagram: https://instagram.com/MyDFIR

▸X: https://x.com/@MyDFIR

Bro what a fantastic explanation can i do this analysis on the host machine or vm machine

— @bibashrai5746

Disclaimer: All opinions in my videos are solely my own. Some links provided are affiliate links!

#cybersecurity #cybersecuritytrainingforbeginners #cybersecurityforbeginners #socanalyst #soc

I learned more from this video than my three years on the job as a SOC Analyst

— @whaleballs25

More User Perspectives

@

How you install exiftools into windows powershel?

@trendypalace5161
@

Love the way you dive into technical details of your SOC analysis/Blue team/Threat hunting videos. Keep it up.

@huyvuquang2041
@

Good one. Got an opportunity to learn about many tools.

@venkateshnambi1576
@

I opened it with Excel and file did not show me the Location description just only when i added file to the website you have provided. .. . wierd. Thanks for your hlelp.

@donalddd-q9m
@

so many tools ! i just wish there was a single tool to do all of the analyzing with. Very good video!

@chapin2513
@

Email Analysis well broken down. I need to safe this video . A big thanks to You Sir 🎉

@oliviangwa3473
@

I must say this has to be the best walk-through I have seen on youtube, it was straight to the point and easy to follow. It was also how it would be done in the wild so I really like that I can clearly see your experience. I don't know how I would know to follow all of these steps without you explain the tools and where to start but maybe they go into detail in the exercise on where and how to follow each step? But, nevertheless great video.

Could you do another videos on one of the exercises from the website?

@zinawarrior2444
@

legend 🔥🔥

@amaljith710
@

perfecto

@LNRD28
@

Pure art, thanks for sharing, you got a new member.

@nofone-pl7kh
@

Hey great instructor. Pls do you have a group or platform we can join to learn more 😮?

@henryfx8673
@

hello. where from I can download phishing emails samples for practice?

@TsotneKverselava-dt1jn
@

ohh damn!
This is quite cool I also learened a lot of new stuff.

@senditall152
@

This what a Brillant video,

I’m just curious but can we use these tools to analyse the phishing emails we receive via our own email address ?

Obviously I will be using a virtual machine like you mentioned.

@keepongaming_yt
@

just observation: he said first couple of bytes but he copied first 4 bytes for file singnature

@Raviteja-le6mt
@

Nice Video!, Where can I find more examples of these email analysis?

@THANNOS1993
@

Your course is wanderfull.

@diegomed3364
@

very detailed if i may ask are these tools the tools used for email analysis or there other tools that can be used

@naturbenefit
@

Hi!

In The phishing analysis 2 couldn't find the last 3 answers
I tried but I couldn't. Can I get any help from your side? Especially in finding the URL analysis.

@vasanthakumar525
@

well-explained. Thanks for the video

@timcyb
@

I love your content, may you kindly do more content

@tumelomathe2444
@

Co Can Da??? What kind of magic roundabout drug-induced swizzle-sticks is this?? 😂

@crowbar9566
@

Wow! Wonderful. Thank you

@gina72725
@

The One we didnt know we needed... FIRE content

@Dablaq2