Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • kkelani
    kkelani at December 15,2016
    This is a very detailed analysis. It is informative and the screenshots as well as narration are extremely helpful in following the series of events.
  • aki
    aki at December 15,2016
    The video shows great information and also tells us that how secure we are? As it shows it's easy for an attacker to spoof his IP address, and creating a FTP connection with the victim machine. He can now use that FTP connection to transfer file from his system to victim's machine, which can include malwares and other information. And he can also download file from victim's system, he can download important files containing credentials, bank information, SSN information and many more private information.
  • Taylorlou
    Taylorlou at December 15,2016
    This was interesting to watch especially considering everything that has been going in the last few years. Just recently OPM became the victim of Chinese APT hackers and became a huge scandal. There was article about how the Chinese unit had been sitting on their system unnoticed for about a year and tracked back to an infamous calling card of theirs:a domain owner name linked to comic book/movie character names. They were able to slide undetected posing as an anti malware service but were actually exfiltrating tons of personnel data concerning government employees! This was really scary.
  • ahammes12
    ahammes12 at December 16,2016
    This video was very interesting because of how amazingly simple this process seemed. The core components were patience and multiple targets over anything else. It is a matter of time and skill to put resources together to infiltrate a hack. The type of files he used to infiltrate (rar & zip) immediately throw red flags when a forensic examiner is analyzing a system.
  • L
    L at December 16,2016
    It's cool we have people that can watch people do bad stuff live. I agree with Safiyah that we need more education on cyber security. Again people are the weakest link.
    • «
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved