-
CCotton10
at April 22,2016
It seems like some of these videos should be used as training tools for some of the Cyber Training courses. It is amazing how simple it was to gain control of someone's email. Security is a real concern.
-
jnegron
at April 26,2016
Excellent presentation about the tools and methods.. Mandiant keep leading the way in forensics and pentest.
-
ronnypaladino
at June 10,2016
Very interesting video. How does the Chinese deny being involved in Cyber activity? Oh, I see, the government is not involved :). This clearly shows the need of implementing strong security policies and have good forensic investigators conducting analysis on discovered penetrated networks to learn the methods used and possibly provide attribution. Mandiant took a step further and went after them, clearly attributing the attacks to the Chinese.
-
jpnick99
at June 12,2016
It's amazing how relatively simple this process was. It was more about patience and multiple targets than anything else. It's just a matter of time and talent to put it all together to pull off a hack. The type of files he was using to ex filtrate and infiltrate (rar and zip) immediately throw up red flags when i'm examining a system.
-
cg09829
at June 19,2016
Good example of how easy it is for the Chinese to steal your credentials and/or gain access to your system via spear phishing.