CCotton10at April 22,2016 It seems like some of these videos should be used as training tools for some of the Cyber Training courses. It is amazing how simple it was to gain control of someone's email. Security is a real concern.
jnegronat April 26,2016 Excellent presentation about the tools and methods.. Mandiant keep leading the way in forensics and pentest.
ronnypaladinoat June 10,2016 Very interesting video. How does the Chinese deny being involved in Cyber activity? Oh, I see, the government is not involved :). This clearly shows the need of implementing strong security policies and have good forensic investigators conducting analysis on discovered penetrated networks to learn the methods used and possibly provide attribution. Mandiant took a step further and went after them, clearly attributing the attacks to the Chinese.
jpnick99at June 12,2016 It's amazing how relatively simple this process was. It was more about patience and multiple targets than anything else. It's just a matter of time and talent to put it all together to pull off a hack. The type of files he was using to ex filtrate and infiltrate (rar and zip) immediately throw up red flags when i'm examining a system.
cg09829at June 19,2016 Good example of how easy it is for the Chinese to steal your credentials and/or gain access to your system via spear phishing.