Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

How to Hack using Metasploit

 

Rating :

 

Comments

 
  • Michael_King
    Michael_King at December 10,2014
    Very interesting! Perfect for people without lots of technical knowledge.
  • Donny
    Donny at December 12,2014
    Who better to discuss Stuxnet than Symantec! Great video and as the poster before me says, very accessible.
  • cknight
    cknight at December 14,2014
    I am afraid of the nature of Sutxnet. The idea that it finds a component of a system dynamically, and attacks it is scary when you consider the trend in government to purchase "commodity" hardware. What if the Siemen's targeted were deployed in other areas? What if a "stuxnet" type of virus can be written for a more broadly used piece of technology? It is scary. BTW - the detail in this video relative to student is AWESOME!
  • JSahm151
    JSahm151 at January 27,2015
    Very interesting to learn about all the capabilities that the Stuxnet worm had. Like the video described none of the technology that went into it was new. However to get the different parts of the worm to work together like that is incredible. I’m curious as to how the worm eventually spread to the centrifuges. The way the worm didn’t attack the systems right away, but waited collecting data was a very neat thing. It’s also scary to think about what would happen if something like this was used in a much more malicious manner.
  • kcn278
    kcn278 at January 28,2015
    I agree that it is very interesting learning all its capabilities. I first heard of this malware when I took my first security course and all I did to catch up on what it was was using Wikipedia. According to Snowden, it was US and Israel that created the virus. The video mentioned that someone knew exactly what the control logic were. One of these two must have obtained knowledge from their spy within the nuclear program to get the malware and the control logic to cope smoothly. Nonetheless, it was carefully thought out and perfectly executed. Glad I watched this video.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved