Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Analysis of Shamoon Virus

 

Rating :

 

Comments

 
  • BrianDaugette
    BrianDaugette at April 02,2016
    I haven't heard of Eli before, but as others have commented, he's very good at breaking complex subjects down and explaining them in a straight forward manner. I have heard of metasploit, but knew nothing about it. Thanks to this video, I've come away with the broad strokes of what it is, what it does, and general ideas on how to use the framework. One thing I would have like to seen, and maybe he does it in the later videos, is see a bit of metasploit in action.
  • stadkal
    stadkal at April 21,2016
    Metasploit - an essential tool of any hacker. starting with basic attacks it can do anything to any target. Just need to figure out what you want to do with it.
  • adam
    adam at April 26,2016
    This was an interesting introduction to Metasploit. It would have been nice to see some screenshots or maybe even some methodology concepts, but if Metasploit is new to you, then this is probably the best way to start. If any pen tester needs these basic computer concepts broken down to this level though I seriously doubt their abilities. This leads me to wonder what the target audience is for this video. In any case I enjoyed watching it. Also, "cli" ? C'mon man.
  • jnegron
    jnegron at April 27,2016
    Quick intro of the metasploit framework, like @BrianDaugette mentioned above I would rather have seen more action , kind of a DEMO instead.
  • rburkett
    rburkett at May 01,2016
    I have used Metasploit before but still thought the video was useful in terms of re-iterating concepts. One thing I have heard is that since Armitage is an interface for Metasploit, but they are not created by the same people, when Metasploit gets updated, it may break Armitage. So, if you aren't using the exact Metasploit version Armitage was designed for, your results may vary.
    • «
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved