Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • sbaba
    sbaba at June 11,2017
    This was a great video. Considering all the technical hoops that this malware had to leap through, there must have been an insider that provided access to the technical details of the nuclear facility. Or this malware was written by someone who worked at the facility; hence, this person knew exactly what the malware had to do. The presenter mentioned the Windows knowledge that was also required, so maybe this person had help from people who worked or still work at Microsoft. This is another example of the power of cyber warfare.
  • jstanfo2
    jstanfo2 at June 19,2017
    The STUXNET computer Virus/Worm/Trojan is a physical structure cyberware marvel. The creators were methodical, exacting and clever to create a software program that could infect multiple devices, identify the target device based on its PLC and then effect the Iranian nuclear centrifuges in such a way to destroy them. The creators of STUXNET relied on human engineering to get the virus from one computer system to another until it reached the target device. The research and information gathering that was necessary to conduct such an operation is impressive and turned out, highly effective when it comes to accomplishing its mission. Organizations such as WikiLeaks and other organizations and people who share this country’s intelligence and provide our enemies information concerning our vulnerabilities should be held accountable. Companies should ensure they are hiring individuals that can be trusted with the interworking of their systems and do not have ties to foreign countries and rogue organizations that may want to exploit them. STUXNET did what no international pact or treaty could do, it took out the centrifuges. I read that STUXNET is still out there and the creators are unable to retrieve or control it. Where will it turn up again? Will it morph over time into something else if the programming becomes corrupted? We may be stuck with it on our networks for quite a long time.
  • Athaoklo
    Athaoklo at June 25,2017
    I'm quite surprise what the Stuxnet can do. It seem like a kind of legal malware. I think malware, hacking, or cyber attacks created by governmental agents would be very powerful, even more effective. They should be used for legitimate purposes in the case of disrupting illegal activities, counter attacks against malicious cyber attacks, or inhibiting crimes I think the Stuxnet have done a great job because it attacked and interrupted the system that can potentially be harmful to humankind. However, I think Iran would not give up the nuclear project development. Even more, they might have improve the cyber security to prevent their nuclear project from failures caused by cyber attacks.
  • meghakamra
    meghakamra at July 07,2017
    Stuxnet is very harmful and heavy virus which has affected nuclear program and it targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines.
  • meghakamra
    meghakamra at July 07,2017
    This video is very interesting as it explains the whole process how this virus gets on to our system throgh user name and password and then interacts with another machine continously etc.
    • «
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved