How to know if your PC is hacked? Suspicious Network Activity 101

Published 2022-08-03
How do you know if your PC is hacked or compromised or infected by malware? In this video we will introduce you to the field of digital forensics looking at suspicious network activity and guide you through autoruns, sysinternals and more, with the example of a live cryptominer.

There will be a live discord workshop after this event which you can join at discord.tpsc.tech/

Sponsored by: analyze.intezer.com/

Get TCPView: docs.microsoft.com/en-us/sysinternals/downloads/tc…

Buy the best antivirus: thepcsecuritychannel.com/best-antivirus
Join the discussion on Discord: discord.tpsc.tech/
Get your business endpoints tested by us: tpsc.tech/
Contact us for business: thepcsecuritychannel.com/contact

All Comments (21)
  • @sweettoko995
    "Sometimes, these hackers can be so clever that they stop the malware from running when task manager is running" Leaves task manager running 24/7, disconnecting from the internet when done Hacker: "You werent suppose to do that"
  • Yep. Pls. Much more if this. I stopped disinfecting people's systems etc. I actually stopped all my IT related work some time ago but there is a severe lack of this particular type of knowledge so anyone picking up these skills are highly valuable to many people. Including themselves since this gives people more to explore and expand their skills even further. Very good channel. Keep it up!! Subbed, liked, shared!
  • @JeffBourke
    Back in the good old days, hackers would actually let you know when you got GOT through some type of taunt message etc. Now, actual software gives you taunts and nag screen and hackers stay on the down low.
  • @CoolJosh3k
    Basically Microsoft lets Windows be so buggy, that actual malicious activity can appear normal.
  • As someone who's PC has been getting frequent CPU spikes, I'm definitely using this video in the (probably near) future.
  • @Sammysapphira
    What I don't understand is why Microsoft doesn't make service names excluisve and especially the company name. It should be forbidden from anyone to set the company to Microsoft if it wasn't actually made by Microsoft.
  • @mukkah
    Just getting back into the PC for fun world after 10 years hiatus, really appreciate this video man. Picked up sysinternal (thanks for sharing about that, didn't even know) and have been playing around with couple of the tools you used here. Definitely need to learn more about network security, looking forward to your other videos
  • Too easy! Recently found multiple signed & undetected malware on my Mom’s PC. She’s always downloading random stuff lol
  • Videos like these are so important it's almost a crime you don't have more views and subs, if I were a boss at YouTube I would be pushing content like this like crazy.
  • @jonarment1229
    These videos are just great. I really enjoy the way you present this information. This is such a nonintuitive subject for most people, and yet it's so critical to learn the fundamentals... Thank you :)
  • 2:00 process explorer rather than process monitor, maybe the priogram changed name in his more recent vid 2:30 sudeenly taking alot of cpu 4:50 making sure miner goes away 5:38 how to know which of these is legitmate or not 7:10 miners canbe smart drop processes when u opne task mangaer 8:20 terminating process tree then summary of above
  • I think I speak for everyone when I say…. that You Sir are hands down some of the absolute best value of our time spent watching online content! Thank you for your incredible devotion to others.
  • @mikelevin9499
    Honestly, thank you so much for this video. It really helped me to not only remove the xmrig file from my computer, but also confront the attacker themselves. Thank you so much
  • @KatyaAbc575
    "If you open up something like Task Manager, they just drop all of their resource usage" I guess good thing I have Task Manager always open?
  • @techbuildspcs
    I usually have encrypted backups on a separate disk but this is good knowledge to have. Some people don't want to wipe.
  • Hi Leo, excellent video. This is a wake-up call to action to understand the art of network security and how easily you can be hacked into by anybody who is trying to do harm to you on the Internet. There's more concern for people attempting to exploit you in many ways. Is encrypting your browser the best way of blocking information? Is encrypting your protected folders the best way to protect you from would-be attackers?
  • @robloxfan4271
    Will defo use this as my network has been quite strange
  • I recently helped a friend figure this out and this video really helped explain what we found!
  • @theautonomous
    Very nice, well edited, good composure. You got a sub from me 👍
  • @luigideff
    Amazing video! Never saw a content like this, very interesting and important! Thank you!