Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • jwren2
    jwren2 at December 12,2016
    I had no idea that there was a tool out there like Maltego! Very interesting! This would be great for penetration testers. Also, for analysts to see vulnerabilities in the network.
  • dbegum
    dbegum at December 13,2016
    Matego BackTrack software is pretty cool. While the searches were going on, it seems like a walking alien with lots of arrows. But it’s a neat way to find out any suspicious website and their links. Also helpful if we just know the name of the website but not anything else such as phone numbers or email address. And if we need to dig even further, we can track that by adding another object to the existing result. The ending images were scary.
  • CyberRanger
    CyberRanger at December 14,2016
    Offensive security has a great certification program. This is a very useful tool.
  • kticfrs500
    kticfrs500 at December 14,2016
    This was a highly technical video with poor quality and I really didn’t like it much. Maybe because I’m only a novice/beginner in this field, I didn’t have a lot of background information on most of the techniques for me to take the lessons one step forward. Being a visual person, the only part I appreciated about this video was the beginning when the speaker was showing us a demo using Maltego. I can see how this can be used to build intelligence by our adversaries on the data stolen during the OPM hacks, for example. From the software they can show relationships between individuals, locations of bases, businesses around these bases, or medical facilities around these locations.
  • kkelani
    kkelani at December 15,2016
    Backtrack is definitely very enlightening. It’s amazing how much information can be found base on connections.
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved