Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Analysis of Shamoon Virus

 

Rating :

 

Comments

 
  • vdutta1980
    vdutta1980 at May 05,2016
    Armitage is good, however, on the website, there is mention of Cobalt Strike... According to the website, Cobalt Strike is a collection of threat emulation tools provided by Strategic Cyber LLC to work with the Metasploit Framework. Cobalt Strike includes all features of Armitage and adds post-exploitation tools, in addition to report generation features.
  • sbudd4
    sbudd4 at June 15,2016
    I appreciate his colloquial delivery and given this was my first exposure to Metasploit (and Eli The Computer Guy), I'm eager to check out not only the rest of his videos on this topic, but what other videos Eli has to offer the middle-aged professional looking to make a career change.
  • jdg8
    jdg8 at June 27,2016
    This is a good introduction to get new users involved in the fundamentals of hacking. I downloaded metasploit community version about a year ago, and it is a great tool for intro users to understand basic concepts of computer hacking. There is so much to learn about it though, and I bet the more expensive version has hundreds of tools and methods not known to the common user. $5000 a year though ........ man that's a lot of dough!!
  • mikebrashier
    mikebrashier at July 14,2016
    This was actually a very informative video for someone like me who is not well versed in hacking methodologies. I aways thought hackers were elite level computer programmers finding vulnerabilities and building specific tools to attack specific system. No, they're just like every other type of computer programmer. They just hack something together using existing frameworks that other smarter programmers wrote.
  • cg09829
    cg09829 at July 22,2016
    Interesting video and way over my head...seems like a really good program for network personnel to test security vulnerabilities, penetration testing and IDS signature development. Thought it was interesting to hear him talk about Framework in that you can choose and configure your exploit and payload.
    • «
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved