Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Analysis of Shamoon Virus

 

Rating :

 

Comments

 
  • kkelani
    kkelani at December 15,2016
    Eli the computer guy is very interesting. I really like the way he broke down the concept of Metasploit. I also like the fact that it’s a framework and not an application. It provides opportunity to be creative.
  • asdfaslkjadsfasdasdfas
    asdfaslkjadsfasdasdfas at December 15,2016
    Looks like everyone commenting on this has great things to say about Eli the computer guy. I hadn't heard of him before watching this video. Glad I was exposed to this resource, he did a pretty great job of explaining the metasploit framework.
  • jgala
    jgala at December 15,2016
    Eli the computer guy has such great content especially when it comes to handling complex situations. He really gives an in-depth walkthrough of multiple software or tools that can be used to perform various tasks that one may not know about. This video has the basics covered but then again homework is needed to learn metasploit to script various attacks.
  • Taylorlou
    Taylorlou at December 15,2016
    I've never heard of metasploit before but it sounds very interesting. Pen testing has always been an interest of mine and being able to learn about some of the tools that pen testers use was a great learning experience. Some of these practices seem like something out of movie such as executing a remote shell prompt on a victim computer but it's all important to under stab the possibilities that metasploit is capable of reaching. It seems like a very pliable platform.
  • aki
    aki at December 15,2016
    Metasploit is one of the best and one of my favorite tool. I love writing scripts in ruby for metasploits, nothing can beat the feeling of writing payload and exploit for different systems. Metasploit currently supports approximately 438 payloads, which are categorized under three categories Command shell, meterpreter and Dynamic payloads.
    • «
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved