-
pneyzari
at March 05,2017
A student prior mentioned that before it was about being a good programmer, but now noting the fact that these tools are not only easily accessible, but also plentiful, means that anyone, anywhere, can download and apply should they wish to do so. On top of that, this video itself is the perfect example of how websites such as YouTube can provide tutorials on how to use these tools, so anyone can learn with just a little bit of desire.
-
pneyzari
at March 05,2017
A student prior mentioned that before it was about being a good programmer, but now noting the fact that these tools are not only easily accessible, but also plentiful, means that anyone, anywhere, can download and apply should they wish to do so. On top of that, this video itself is the perfect example of how websites such as YouTube can provide tutorials on how to use these tools, so anyone can learn with just a little bit of desire.
-
pneyzari
at March 05,2017
A student prior mentioned that before it was about being a good programmer, but now noting the fact that these tools are not only easily accessible, but also plentiful, means that anyone, anywhere, can download and apply should they wish to do so. On top of that, this video itself is the perfect example of how websites such as YouTube can provide tutorials on how to use these tools, so anyone can learn with just a little bit of desire.
-
bschmid5
at April 20,2017
First, the term APT is an acronym for Advanced Persistent Threat (APT) operators. The video does not discuss just who, or what, APT1 happens to be; but, a quick internet search finds that APT1 is a single organization of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006. I found a few things interesting regarding the video. Unless the hacker was actually recording his own actions, his system must have been compromised by some law enforcement or cybersecurity organization for them to have been able to record the hackers actions. I also noticed that the hacker was running a Windows XP system. Microsoft support for Windows XP ended in 2014. There is no date associated with this video, but I am surprised to see a Chinese hacker using an OS which is no longer being patched as a platform for their own illicit activities. Finally, the last video segment discusses the hacker retrieving a RAR file from a remote system, but the file name was “all.jpg” which is an attempt at hiding the nature of the file by using a different file extension than .rar – something which was discussed during the class lectures.
-
sstumvoll
at April 23,2017
These short videos demonstrate how the hackers are so familiar with the systems that it is second nature to them. The presentation moved very fast so it was difficult to grasp exactly how they operate. But a good presentation on how easy it is for them to use good tools in a bad way.