Chinese APT hackers remotely controlling a victim.
dmoravalat April 22,2015 Very nice video showing details how attacks are over internet. Hackers use every tool developed to compromise a system, from emails accounts, FTPs, Web server, to RAR files. They can steal any kind on data such as credentials, account bank data. They do reconnaissance, penetration and ex-filtration.
mariawhit8at April 29,2015 Its amazing how they try to make it easy for hackers with very little knowledge to get into a system via a GUI. But it still obvious this hack isn't that easy to perform.
hhammadiat May 05,2015 The video discusses how Ghost Rat server application followed by the WEBC2-HEAD C2 Server to control the IP of the victim. This little demonstration shows how easy it is to manipulate the IP.
kkrishnaat June 16,2015 I think it is very interesting to see just how many tools are at their disposal. I think dealing with the Chinese is very difficult. On the one hand, the US government wants to have good relations with them for obvious economic reasons but obviously is concerned about their growing influence. Obviously, these incidents of Chinese cyberattacks make the diplomatic relationship rather tenuous, In addition, it makes it difficult for the US to address these types of incidents because if thet go public with their concerns, it can impact the relationship. It really is fascinating how this has now happened multiple times, but there isn't much anger from the US government, as they have to walk a diplomatic tight rope. On the one hand, they are furious but obviously they can only speak to reporters about any Chinese hacking incidents off the record, in order to avoid angering the Chinese government.
Emmereetat July 03,2015 Interesting video that shows a hacker trying to get access into the victim’s system and how it doesn’t always go as smooth as expected. However they were still able to gain total access by using different tools. Scary to think that they can do this with relative ease.