Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • rparate
    rparate at July 07,2017
    Very Interesting video about this malware STUXNET,never knew about this malware before.I think it's really dangerous how it works and caused damage to Iran's nuclear program.It has three modules basically the worm,attaching the worm and then hiding to be caught/detect by any other software.It's interesting to see how it attach itself to PLC by using basic loopholes as in this case simple login ID and password. The presenter also talks about how this malware imposter itself by showing fake centrifuge speed and i think it's a brilliant way to hack.
  • nnijiati
    nnijiati at July 21,2017
    It is interesting learning all its capabilities. According to Snowden, it was US and Israel that created the virus. The video mentioned that someone knew exactly what the control logic were. One of these two must have obtained knowledge from their spy within the nuclear program to get the malware and the control logic to cope smoothly. Interesting video.
  • gloayza
    gloayza at July 22,2017
    It is important that the speaker emphasized the source of Stuxnet as being a nation-state/APT due to size of it as well as the sophistication. Also to note, the technology of Stuxnet was superior due to vast research and had to involve espionage and/or insider breach. Although it may be said that the centrifuges affected did not cause a power outage as may have been the case in other nuclear facilities, we will soon see the negative impact of the Internet of Things where a major virus/worm can severely impact millions.
  • jonathant1
    jonathant1 at July 28,2017
    Very detailed explanation on Stuxnet for an audience that “appears” to lack technical knowledge. Cybersecurity experts still claim that Stuxnet was one of the most advanced pieces of malware ever released since it targeted nuclear power plants. The IFCI course gave us solid information on the malware. Stuxnet used valid (signed) digital certificates to overload nuclear centrifuges. It was interesting to see the malware spreading in an air-gapped environment by using USB keys (controllers).
  • cmassey
    cmassey at July 28,2017
    I remember when Stuxnet was going around through the news. There was a lot of panic about how sophisticated the malware was, and how it "magically" appeared. The speculation was all over the place, of course... until everyone realized... "oh, it was us." The panic turned into self-blaming and apologizing, hmph.
    • «
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved