Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • iahmad94
    iahmad94 at September 08,2017
    Might be a silly question, I wonder why he's utilizing FTP instead of SFTP? Wouldn't an encrypted session be better off to stop admins and local IDS from logging and tracking exactly what he's sending back or pulling in? I guess it also depends on firewall config...
  • domcalder
    domcalder at September 09,2017
    This attacker was persistent in getting everything he needed to complete the attack. The attacker had to utilize social engineering in order to get successful sphere phishing attempts. Though he had to utilize many tools for the attack success, his persistence is what ultimately got his success. I would think many people would give up but the motivation the attacker had was probably stronger than simply giving up when his attack wasn't very successful.
  • rbflapjack
    rbflapjack at September 09,2017
    Interesting but a lot of this was beyond me. It definitely peaked my interest though to learn more about hacking and cybersecurity. Much of it looked fairly simple but would take some time and persistence. I will look into the full report that is mentioned in some of the earlier comments.
  • stkramergmu3
    stkramergmu3 at September 09,2017
    This video definitely does a great job of pointing out how hacking with simple tools can be about as easy as signing up for a credit card. What I would like to know more about is the data they were after, and how successful they were in getting it. How much info can an "unsophisticated" hack really glean, and what level of defense would have prevented it? It seems like more and more, cybersecurity is becoming less about "protect everything" and more about cost/benefit.
  • secallahan
    secallahan at September 14,2017
    It's interesting to get a first-hand look at spearfishing in progress. I've heard the term before, but I never really had a complete understanding. With spearfishing, hackers attempt to gain access to sensitive information, especially financial information, by sending emails from someone you know (or think you know). It was beneficial to see the process they go through to gain access to this sensitive information.
    • «
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved