Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Analysis of Shamoon Virus

 

Rating :

 

Comments

 
  • michealb40
    michealb40 at September 04,2016
    Good description of Metasploit as well as providing excellent resources to learn more. However, 24 minutes of non-technical explanation was too much. If he said the word Framework one more time I would have shut it off.
  • dbegum
    dbegum at September 23,2016
    I like the videos by the “Eli the computer guy” as they are very easy to understand. This is an interesting video but found bit weird too. It’s like we are being told how to use a system to hack another system and different opportunities we have. But the most interesting part is that a fifteen years old was able to hack a government system having no experience; I would not be able to do even single attack. Interesting part isn’t that he hacked a DOD system but knowing that system can be vulnerable to attacks and it doesn’t take someone with tons of experience to conduct such attacks. Another part of Metasploit Eli made was regarding subscriptions. Well, the price may seem high for general companies but definitely big companies can afford if they are more concern about protecting their contents. However, $5,000/year/user bit ridiculous as nbodyk mentioned. Overall, I would like to give it a try and see what’s it’s all about.
  • kbacon5
    kbacon5 at October 06,2016
    This was a very interesting overview of Metasploit. He did a great job explaining the terminology and basic features of Metasploit. What is interesting to me is how a lot of these tools are available for mobile platforms now. I have a Nexus 6 that I was running Kali NetHunter on with metasploit before I flashed it back to the stock android os. Msfconsole and other tools worked very good on the Nexus 6 but it is good to have an external keyboard because even with apps like the Hacker keyboard for Android it can be very slow to type in commands or do coding on the phone's keyboard. I was able to run NMAP from my Nexus 6 with my other regular phones IP address. One phone was on T-Mobile and the other was on Verizon. And the tool successfully showed the regular phone's OS and other information about the phone. I do not really understand how it works on the cellular networks but I would like to learn more about pen testing with mobile devices since mobile is so popular.
  • BBurgess
    BBurgess at November 13,2016
    Awesome introductory video to Metasploit. He does a really good job outlining the framework of Metasploit. Watching this video makes me want to get back into learning penetration testing again. Watching these videos and becoming familiar with the Metasploit framework, can be a very useful and powerful tool. One avenue I would like to explore is using the mobile platform for Metasploit. Everything these days are becoming more mobile and incorporating Android OS, iOS and others. It would be beneficial to learn about the different mobile exploits in order to protect yourself and your company if you do it for work. It looks like I have some Metasploit fun in my future.
  • sam
    sam at November 21,2016
    Eli the computer Guy is a wonderful resource to learn, he expain in a very simple and undersatandable way Metasploit framework to build additional stuff needed, modules specific plugin to perform the specific task, like function in programming payload shell code-> able to run command line attack that is great Listener- listen for incoming connection one of the benefit of Metasploit framework is the built in database which helps to aggrigate network data for further use. realy looks a very cool tool to use, may be I play with it when i get time
    • «
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved