Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • asdfaslkjadsfasdasdfas
    asdfaslkjadsfasdasdfas at December 03,2016
    Really like the fact that he drove home the fact that this was not novel technology or techniques, it was just the combination of so many near-novel techniques that made this effort so extraordinary. I also think that it's very interesting that a lot of cyberwarfare involves exploiting things made by microsoft. It seems somewhat irrational to me that Iran was willing to spend billions on their nuclear program, but at no point it ever dawned on anybody to consider an alternative to Windows within natanz, like openBSD or some proprietary custom linux distro. I realize that this would be extremely inefficient to implement for all sensitive operations, but I feel like if you're trying to break international law to enrich uranium to build a bomb, you should splurge on minimizing your cyber security risk. Iran wasted a bunch of money.
  • asdfaslkjadsfasdasdfas
    asdfaslkjadsfasdasdfas at December 03,2016
    Really like the fact that he drove home the fact that this was not novel technology or techniques, it was just the combination of so many near-novel techniques that made this effort so extraordinary. I also think that it's very interesting that a lot of cyberwarfare involves exploiting things made by microsoft. It seems somewhat irrational to me that Iran was willing to spend billions on their nuclear program, but at no point it ever dawned on anybody to consider an alternative to Windows within natanz, like openBSD or some proprietary custom linux distro. I realize that this would be extremely inefficient to implement for all sensitive operations, but I feel like if you're trying to break international law to enrich uranium to build a bomb, you should splurge on minimizing your cyber security risk. Iran wasted a bunch of money.
  • jwren2
    jwren2 at December 12,2016
    Stuxnet is just an amazing piece of malware. It is just crazy to think that malware can do this much damage to anything electronic and it doesn't even have to be connected to the Internet. What's more amazing is that how you can fine tune it to a specific object.
  • jgala
    jgala at December 12,2016
    Stuxnet is really sophisticated piece of malware that was designed primarily on the basis of using default credentials. I feel that everyone needs to learn to never use default credentials that are given with any system. The fear that Stuxnet may or may not have been on you system is a different dimension as to what may have led it get on to your systems. But the real implementation of Stuxnet was really designed in a terrific manner to attack on specific set of hardware attached to the system and leaving the rest out.
  • jgala
    jgala at December 12,2016
    Stuxnet is really sophisticated piece of malware that was designed primarily on the basis of using default credentials. I feel that everyone needs to learn to never use default credentials that are given with any system. The fear that Stuxnet may or may not have been on you system is a different dimension as to what may have led it get on to your systems. But the real implementation of Stuxnet was really designed in a terrific manner to attack on specific set of hardware attached to the system and leaving the rest out.
    • «
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved