Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • msharma6
    msharma6 at January 30,2017
    There was so many tools available for different types of cyber attacks. Back in the day, you had to be a good programmer to access a compromised system but with these tools being easily available, programming is probably not a pre-requisite. It is very difficult to perform these attacks but this video made it seems easier than it is to accomplish these tasks.
  • shubhragupta
    shubhragupta at February 02,2017
    Though I couldn't understand the video from a technical perspective, it appears from the video how the user was able to succeed in doing his task after several attempts. There are several tools available to successfully hack systems. The video provides insights into hacking in cyber world effectively.
  • echukalov
    echukalov at February 10,2017
    I'm not sure how old is this video, but today (2017), most of these attacks could be executed by a script kiddie. While they are calling it "APT" or "Advanced Persistent Threat", the attacks that were covered do not require that much knowledge about hacking. There are plenty of free and readily available tools for phishing and sending mass email on the Internet. Some are designed for legitimate purposes, such as marketing or newsletter emails, etc. However, any of these tools can be easily weaponized by using malicious content in the email. Everyone knows how to create Gmail accounts and the Google email servers can be used to send phishing emails just as easy. There are many free Command and Control(CC) tools as well. Thankfully, most companies and the government have defenses that would easily detect any of the activities in the video, or using "known" tools during the attack. The bigger issue is the average home user. Most people don't know how to protect their computers or to find out if they have been infected/compromised, other than relying on their antivirus to catch anything. Most serious APTs would not manually download tools and type CMD commands, in plain sight of the user. Just clicking on the wrong link, could allow and adversary to take over someone's system. The user won't even see a thing. Everything is scripted and fully automated. Uploads/downloads are encrypted and the CC can be a legitimate site, such as Twitter or Pastebin. Also any processes would most likely be running only in memory, without even touching the hard drive. This makes it much harder to detect, even for professional IDS systems.
  • jahmad
    jahmad at February 12,2017
    It is eye opening to see how easily someones system can be compromised and files stolen. This is why security should be of primary concern for every individual user, wether on a laptop or mobile phone. Dota's awareness of some of these security practices were sub par though or he was lazy as he followed some bad practices such as using FTP over SFTP and connecting from his home network.
  • pneyzari
    pneyzari at March 05,2017
    A student prior mentioned that before it was about being a good programmer, but now noting the fact that these tools are not only easily accessible, but also plentiful, means that anyone, anywhere, can download and apply should they wish to do so. On top of that, this video itself is the perfect example of how websites such as YouTube can provide tutorials on how to use these tools, so anyone can learn with just a little bit of desire.
    • «
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved