Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • Ahmed
    Ahmed at February 20,2015
    it's amaizing how they stablished these methods all together for the attack but i think mandiant did a great job to figure out the exact details(tools, ip addresses and even hardware) of the crime.
  • DPerry
    DPerry at February 21,2015
    Connellyt: good point - definitely could use some insight Thanks for the link. It is definitely interesting just how simple it can be to do absolutely anything given the knowledge of an existing tool. Even a complete lack of understanding today can be remedied by a mere ability to search properly.
  • kcn278
    kcn278 at February 26,2015
    Nice detailed video, makes me wonder how long did the APT hacker remain undetected for. I like what the hacker did with the input when making the account and the logic process of extracting the stolen files.
  • Jmurray8
    Jmurray8 at March 10,2015
    Great practical discussion and presentation on hacker tools and methods as described in Mandiant APT1. Very rapid presentation,
  • skatakam
    skatakam at March 14,2015
    Mandiant is awesome, According to Mandiant, Ugly Gorilla, DOTA and SuperHard – as the actors have been named – made “poor operational security choices,” allowing them to track their activities. http://news.softpedia.com/news/Hackers-Working-for-Chinese-Military-Ugly-Gorilla-DOTA-SuperHard-330773.shtml
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved