Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • jgala
    jgala at December 15,2016
    Information gathering is the very basic skill of penetration testing which really helps a pen-tester to understand how weak the security of a system can be. Backtrack now known as Kali OS has really great tools that are very useful to conduct pentesting or even basic forensics tools are available. NMAP, Metasploit, Xplicio, etc are various useful tools that are used.
  • Taylorlou
    Taylorlou at December 15,2016
    This was a really eye opening video. It was nice to be able to see the theory of have be played from reconnaissance to eventual execution. But, it's crazy to think a lot of the attack is actually built on that intial phase of the simple task of research. These are simple methods to gather information on and take advantage of a person based on what they know. Social engineering is very deceptive but also difficult to detect 100% of the time, placing more pressure on the end users judgement-whether that be good or bad.
  • aki
    aki at December 15,2016
    The video shows us great information about information gathering phase of penetration testing process. Other than tools described in the video. BackTrack 5 information gathering tools of interest are CMS identification and IDS-IPS identification for web application analysis. CMS identification gives information about the underlying CMS, which can be used to do a vulnerability research on the CMS and gather all the available exploits to test the target system.
  • aki
    aki at December 15,2016
    The video shows us great information about information gathering phase of penetration testing process. Other than tools described in the video. BackTrack 5 information gathering tools of interest are CMS identification and IDS-IPS identification for web application analysis. CMS identification gives information about the underlying CMS, which can be used to do a vulnerability research on the CMS and gather all the available exploits to test the target system.
  • aki
    aki at December 15,2016
    The videos shows us information gathering phase of penetration testing process. Other than mentioned tools in the video there are some more important tools in backtrack. BackTrack 5 information gathering tools of interest are CMS identification and IDS-IPS identification for web application analysis. CMS identification gives information about the underlying CMS, which can be used to do a vulnerability research on the CMS and gather all the available exploits to test the target system.
    • «
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved