-
kkelani
at December 15,2016
This is a very detailed analysis. It is informative and the screenshots as well as narration are extremely helpful in following the series of events.
-
aki
at December 15,2016
The video shows great information and also tells us that how secure we are?
As it shows it's easy for an attacker to spoof his IP address, and creating a FTP connection with the victim machine. He can now use that FTP connection to transfer file from his system to victim's machine, which can include malwares and other information.
And he can also download file from victim's system, he can download important files containing credentials, bank information, SSN information and many more private information.
-
Taylorlou
at December 15,2016
This was interesting to watch especially considering everything that has been going in the last few years. Just recently OPM became the victim of Chinese APT hackers and became a huge scandal. There was article about how the Chinese unit had been sitting on their system unnoticed for about a year and tracked back to an infamous calling card of theirs:a domain owner name linked to comic book/movie character names. They were able to slide undetected posing as an anti malware service but were actually exfiltrating tons of personnel data concerning government employees! This was really scary.
-
ahammes12
at December 16,2016
This video was very interesting because of how amazingly simple this process seemed. The core components were patience and multiple targets over anything else. It is a matter of time and skill to put resources together to infiltrate a hack. The type of files he used to infiltrate (rar & zip) immediately throw red flags when a forensic examiner is analyzing a system.
-
L
at December 16,2016
It's cool we have people that can watch people do bad stuff live. I agree with Safiyah that we need more education on cyber security. Again people are the weakest link.