-
jgala
at November 06,2016
GhostRAT is widely used tool for hijacking systems along with performing various tasks on the hijacked system. The good part about the video is it shows various methods on how systems can be compromised which is really helpful to avoid such attacks in future. Mandiant has acquired a lot of in-depth details which are used for internal training but some of them, which are released to public are useful. As the video is old that is the reason that Gmail got tricked into creating account based on IP & not on the phone number confirmation which has been patched so far.
-
jgala
at November 06,2016
GhostRAT is widely used tool for hijacking systems along with performing various tasks on the hijacked system. The good part about the video is it shows various methods on how systems can be compromised which is really helpful to avoid such attacks in future. Mandiant has acquired a lot of in-depth details which are used for internal training but some of them, which are released to public are useful. As the video is old that is the reason that Gmail got tricked into creating account based on IP & not on the phone number confirmation which has been patched so far.
-
sam
at November 11,2016
It is very helpful to see such kind of back door made for exploitation. Sometimes I wonder how come the designers of such devices unable to figure out such kind of weakness in the system. I'm assuming that one of the designing criteria is making sure the system is secure. I feel that we are carrying a decade-long problem, which needs to go back and fix everything. Instead thinking ahead of time come up with really better secure stuff before releasing to the market
-
sam
at November 11,2016
It is very helpful to see such kind of back door made for exploitation. Sometimes I wonder how come the designers of such devices unable to figure out such kind of weakness in the system. I'm assuming that one of the designing criteria is making sure the system is secure. I feel that we are carrying a decade-long problem, which needs to go back and fix everything. Instead thinking ahead of time come up with really better secure stuff before releasing to the market
-
Safiyah
at November 21,2016
I can't help but have the word "unsettling" come to mind over and over as I watch more of the videos in this gallery. As several others have commented, it is majorly worrisome how easy it seemed for this (persistent) hacker to steal and upload the victim's files. More concerning is the fact that I have known folks who would actually open up those .zip attachments on the phishing emails if not for my insistence otherwise. Thinking about the number of hackers out there who are dedicated to stealing and the sheer number of people who are highly susceptible to falling victim is a scary thing; people all over the world need to be better educated on cyber-security to have a chance at protecting themselves in this technologically pervasive age .