Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • stadkal
    stadkal at April 21,2016
    Its very interesting and great knowledge to have for any cyber world member. Knowing about Stuxnet is crucial thing to know for any new comer to cyber world as it explains what any worm or virus can do.
  • jnegron
    jnegron at April 27,2016
    Really like the sophistication of the attack, this is clearly a good collaboration between Coders and scientist .
  • sbudd4
    sbudd4 at June 15,2016
    Finally a clear and concise synopsis of Stuxnet transparently caveated with knowns and assumptions.
  • dgrove
    dgrove at June 17,2016
    This was a great break down of stuxnet. I remember when this hit the news and the reported damage it did to the Iranian systems. I read a few articles about stuxnet, but they were mostly based on "who did it", and the ethics behind releasing a virus of this magnitude into the wild, if it was done by a nation state. Stuxnet does also highlight how nations infratstructure systems are a huge target when it comes to conducting attacks that don't requite a large standing Army to attack or even defend the infrastructure target. The general American public, I believe, still does not understand how our essential utilities we take for granted everyday can essentially be turned off. The American 2003 Northeast blackout does have thoughts out there that it may have been a cyber attack. So, who knows, but it highlights how vulnerable our lives are when it comes to computers.
  • jpnick99
    jpnick99 at June 20,2016
    I found this to be the most interesting video on this site so far. The amount of engineering that went into creating and executing this virus is impressive. They were able to craft a tiny virus that opened shares, conduct peer to peer updates, work on two totally different systems not speaking the same language, and lay dormant all the while collecting data about the enrichment devices. I found it interesting the sys admin did not change the default password on database software, which help proliferate the spread of this virus. Despite the potential harm something like this did and could cause, it's still an impressive piece of engineering.
    • «
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved