Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • sstumvoll
    sstumvoll at February 10,2017
    This is a very good video on information gathering and vulnerability analysis, although he moved through it very fast. Using the various tools of Backtack5 you can really reach deeply with very little information Backtrack very powerful. Since I'm not very good with the command line, I would be interested to see the graphical version. I am impressed that it can still gather information even when the firewall is turned on.
  • msharma6
    msharma6 at March 06,2017
    Great video! Its a good tutorial to learn what all can be done using backtrack and how powerful this tool can be. It can be very useful to look for vulnerabilities in a network.
  • shubhragupta
    shubhragupta at March 11,2017
    The video is full of information about the tool Back Track used for penetration testing and forensic investigations. It was very useful in demonstrating ways to look for network vulnerabilities and demonstrate to potential clients. Looks like there are multiple ways to gather information about targets.
  • jahmad
    jahmad at March 12,2017
    This video is a great intro to Back Track. This version of Linux has since been named Kali though. I believe gathering information before carrying out an attack is the key to all successful attacks. The more information you have the more knowledgable you are on how the network works and what avenues you have to exploit. I believe Kali Linux is a great tool for penetration testing as it gives you all the tools.
  • student0
    student0 at March 14,2017
    The tools demonstrated by the penetration tester are certainly powerful. I do think Maltego appears to be a very useful tools; however, I wonder how much these tools cost. It seems that there are a plethora of tools out there to conduct open source research as well as network reconnaissance. I would like to see how the presenter would use multiple databases/tools to collect and synthesize data.
    • «
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved