Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • tritran42
    tritran42 at April 30,2017
    This video shows APT Chinese hacker attack into victim computer from the network. First, the attacker sets up an email account. Next, is using the email account for spear phishing emails. Then the attacker tests the Ghost RAT C2 server. After that, the attacker uses WEBC2-HEAD C2 server, which is the command line to list all the files. Also, the attacker uses the HTRAN to communication between the victim IP address and the attacker’s IP address. Then the attacker verifies stolen exchange credentials. Finally, the attacker uses the LIGHTBOLT to stealing files and transfers them to Shanghai FTP server. As you can see this video provides what steps and tools that the hacker uses to attack into victim computer. In the forensic examiner view, the video provides very useful information to collect the evident. For example, the attacker sets up the Gmail without filling the country. However, the Google does not let attacker does that. That is why; the attacker has to provide his or her country and phone number. That is how we know where the attacker is.
  • BSharma
    BSharma at May 03,2017
    This video demonstrates the ease with which a hacker can set up an Advanced Persistent Threat. Using the Email as the entry point to the victim's machine, he then uses both a GUI and command line commands to list all the files in the victim's email inbox. This lists the numbered file and the size of the files. The various servers and lists of tools used to capture the contents of the email list provides a good introduction to what hackers can do.
  • BSharma
    BSharma at May 03,2017
    This video demonstrates the ease with which a hacker can set up an Advanced Persistent Threat. Using the Email as the entry point to the victim's machine, he then uses both a GUI and command line commands to list all the files in the victim's email inbox. This lists the numbered file and the size of the files. The various servers and lists of tools used to capture the contents of the email list provides a good introduction to what hackers can do.
  • sreinoso103
    sreinoso103 at May 04,2017
    Operating system seems old and outdated, but the approach seems timeless. Establish connection, get a file sharing system up and running, spear phishing - all still present today.
  • sreinoso103
    sreinoso103 at May 04,2017
    Operating system seems old and outdated, but the approach seems timeless. Establish connection, get a file sharing system up and running, spear phishing - all still present today.
    • «
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved