Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Analysis of Shamoon Virus

 

Rating :

 

Comments

 
  • jczarny
    jczarny at March 08,2015
    I've always liked Eli the Computer Guy. He always does a great job at explaining even very complicated subjects. In this case, this was just a real simple primer on metasploit that also covers some other simple exploit terms. I learned a little, but not a lot. I found an article about the FBI using parts of the metasploit framework to crack TOR which is also interesting. http://www.wired.com/2014/12/fbi-metasploit-tor/
  • tristayifei
    tristayifei at March 12,2015
    I like Eli’s explanation about what Metasploit and Metasploit are, and why Metasploit is important to penetration. He did a really good job on explaining even small areas, such as the stars of the price, preparation for installing the software(turn anti-virus and firewall softwares off), and explanation of specific terms(exploit, payload, shellcode, modules, listener, etc.). I wish I can watch more videos on how Metasploit works,not just theories themselves.
  • Ahmed
    Ahmed at April 16,2015
    metasploit is a very great tool for pen testers, Eli mentioned couple of important aspects we need to consider when using it, the Metasploit Penetration testers guide book goes into more details it's a brilliant book.
  • kcn278
    kcn278 at April 25,2015
    Ive used metasploit for a course I took and the codes, shell, and payloading dropping confused me. The part where he elaborates on it when working with metasploit clears it up. Good explainer.
  • skatakam
    skatakam at April 29,2015
    Nice teacher. Explained functionality of the tool and how it is very useful for pentesters. However, we have to take a note that it has a shady side of the usage too.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved