Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • haneen
    haneen at February 11,2016
    Its awesome how it takes the authenticity of known corporation to the main target, and then attacks the main target, I'm wondering what technique can stop such a technology.
  • tcmahony
    tcmahony at February 11,2016
    Probably the scariest thing about this is that these ICS/SCADA related systems are becoming more and more connected over IP based networks as opposed to the serial networks. Given that the presenter said that there were no technical feats with Stuxnet, if its just a matter of getting access to a IP based network these types of attacks will most likely increase. While the engineers may have had the due diligence to ensure anti-virus and have other mechanisms in place, a simple USB drive may have been the ultimate attack vector. The engineers for these types of systems need to understand the impacts of placing them on IP based networks or even allowing USB drive access, from Stuxnet alone you can see the damage it can do. The damage may even be worse if this was against something like a utility system such as power or water.
  • fpazdzin
    fpazdzin at February 16,2016
    Just another case of people not taking all of the necessary steps to secure their systems. All they had to do was disable that default password on their database and they could’ve prevented this attack. There were also a lot of individual factors that all played a part in the spread of this virus. It first had to get on one of the computers at the site. Then it needed to spread to other systems that were on a different network. So it needed to be able to spread on its own, update itself when it was able to, and allow itself to be copied onto removable media without being detected in order for it to gain access to the system that it needed to target. It’s quite interesting how sophisticated this virus was. There was a lot of time, effort, and research that must’ve gone in to creating this worm in order to pull off this hack.
  • nbaker3
    nbaker3 at February 24,2016
    I have been studying Stuxnet every since I started taking IT classes at GMU. It is rare that a semester has gone by without. at least, the mention of stuxnet. It is amazing to learn how none of the software was new to anyone. Interesting to learn about why the actual Stuxnet file was much bigger than other viruses normally seen. Also great video on how complex the Stuxnet process really was. Great video!
  • danielm8
    danielm8 at April 18,2016
    Stuxnet is very cool, but could be very dangerous! The thought and logic that went into it is very complicated. It must have been done by a government because of its target and intricacy. If the target was different, all computers may be harmed since it is easily spread and almost untraceable since it has valid certificates.
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved