Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • sagarwa9
    sagarwa9 at December 08,2015
    Worm, trojan horse and virus packed into one, although it was a malware but got to acknowledge the skills of the developer of stuxnet. Complexity of stuxnet explained in a very similar manner.
  • busterhax
    busterhax at December 10,2015
    Astonishing that this had to be in the wild for quite some time before it did it's duty, yet the technology was so advanced. This means that it was created way ahead of its time.
  • CCotton10
    CCotton10 at January 29,2016
    Very interesting the complexity and effectiveness of Stuxnet. It is scary that it was 50 times the typical threat. It should cause use to pause thinking about the potential damage that could be done with a mass distribution as was described. What amount of damage could be done to hardware and software and how long would the recovery take?
  • adam
    adam at February 03,2016
    I think Stuxnet is one of the coolest things in computer security. I have been glued to every article I could find about this when it happened and it continues to teach us lessons. It is a feat of espionage, engineering, and moral responsibility. Three things that rarely come together. Stuxnet has always raised so many questions for me and I hope that someday the entire story can be told. Stuxnet is also a bit of a Pandora's box. It is a game changer that has changed how attackers write malware and it shows the lengths at which attackers will go to compromise very specific targets. I seriously doubt Stuxnet was the first attack of such sophistication and I can only imagine what it's programmers have worked on since.
  • adam
    adam at February 03,2016
    I think Stuxnet is one of the coolest things in computer security. I have been glued to every article I could find about this when it happened and it continues to teach us lessons. It is a feat of espionage, engineering, and moral responsibility. Three things that rarely come together. Stuxnet has always raised so many questions for me and I hope that someday the entire story can be told. Stuxnet is also a bit of a Pandora's box. It is a game changer that has changed how attackers write malware and it shows the lengths at which attackers will go to compromise very specific targets. I seriously doubt Stuxnet was the first attack of such sophistication and I can only imagine what it's programmers have worked on since.
    • «
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved