Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Analysis of Shamoon Virus

 

Rating :

 

Comments

 
  • sam
    sam at November 21,2016
    Eli the computer Guy is a wonderful resource to learn, he expain in a very simple and undersatandable way Metasploit framework to build additional stuff needed, modules specific plugin to perform the specific task, like function in programming payload shell code-> able to run command line attack that is great Listener- listen for incoming connection one of the benefit of Metasploit framework is the built in database which helps to aggrigate network data for further use. realy looks a very cool tool to use, may be I play with it when i get time
  • Safiyah
    Safiyah at November 23,2016
    Yes, free stuff is generally favored here, but wow were those Metasploit prices nuts! That said, I had never heard of it before, but Eli describes the basics of Metasploit in such an easy to understand way that I feel I have a fair understanding of it now. The presentation itself was very well organized and Eli has a great energy to keep viewers from getting bored or losing focus. Overall, as mentioned previously, this is a great video and it made me want to learn more from him.
  • asdfaslkjadsfasdasdfas
    asdfaslkjadsfasdasdfas at December 10,2016
    Really like how he explained the realities of an attack potentially taking over a year and the importance of staying below a threshold before a victim is aware something is going on.
  • jwren2
    jwren2 at December 12,2016
    I love Eli the Computer guy! That’s pretty cool that Metasploit is a framework to create tools within it, and that you can fine tune it to go after specific things. Great explanation of the terms and plugins. What’s really cool is that it has its’ own database to store information that it’s gathered and to focus on many systems at once. Very useful for penetration testers.
  • CyberRanger
    CyberRanger at December 14,2016
    Great tool. It comes with Kali and Backtrack Linux.
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved