Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • thorner
    thorner at March 29,2017
    Back Track seems very powerful and relatively easy to use. I like that there are GUI elements in the command prompt as well - it's impressive how many options there are. This was a good video because he walked us through the process of information gathering and showed how powerful the tool is/how much information you can get from a network that is relatively unsecure. This tool is useful for a hacker but can also be very useful to someone trying to test the security of their network.
  • bschmid5
    bschmid5 at April 28,2017
    This video was published on February 14, 2013 and discusses the BackTrack 5r3 penetration testing tool. BackTrack is a Linux-based operating system distribution that comes with a rich repository of security and forensics tools to provide a penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Visiting the BackTrack website (http://www.backtrack-linux.org/) displays a message that BackTrack is no longer maintained and a link to the Kali Linux distribution (https://www.kali.org/) website is prominently displayed. BackTrack was a Linux distribution that focused on security based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux, therefore superseding the older BackTrack.
  • tritran42
    tritran42 at April 30,2017
    This video shows how to using the BackTrack for penetration testing and vulnerability. Moreover, the video also introduces maltego tool. It is very useful tool in the forensic investigation because it can show the relationships between two or more objects. Furthermore, the video talks about the scapy, arping, nbtscan and nmap tools. Those tools use to analyze the vulnerability and how soft the internal network is. Last is driftnet, which uses to intercepting the information. Overall, this video is very useful for penetration testing and vulnerability.
  • BSharma
    BSharma at May 03,2017
    this video discusses how to use Backtrack for information gathering and penetration testing. The speaker mentions that this tool is potential time saving activity. Starts with using Maltego to begin the investigation. This tool shows "exposure" , meaning how much information is readily available about the source. The source is defined as an email address, Ip address, phone number or even a name. The tool searches the web for information about the source. The tools allows you to captures as much information about the target as possible. The graph workspace allows the user to show relationships between the objects. Shows multiple relationships between objects and other downstream objects such as email address or phone numbers. This tool seems relatively straight forward for finding entity relationships. It would be interesting to see how close it resembles the capability of tools such as Palantir.
  • BSharma
    BSharma at May 03,2017
    this video discusses how to use Backtrack for information gathering and penetration testing. The speaker mentions that this tool is potential time saving activity. Starts with using Maltego to begin the investigation. This tool shows "exposure" , meaning how much information is readily available about the source. The source is defined as an email address, Ip address, phone number or even a name. The tool searches the web for information about the source. The tools allows you to captures as much information about the target as possible. The graph workspace allows the user to show relationships between the objects. Shows multiple relationships between objects and other downstream objects such as email address or phone numbers. This tool seems relatively straight forward for finding entity relationships. It would be interesting to see how close it resembles the capability of tools such as Palantir.
    • «
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved