Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • stkramergmu3
    stkramergmu3 at September 16,2017
    I love Maltego and have used it for a broad range of applications. It is a powerful and easy to use graphical application, and I use it not only for network analysis, but for things like organizational stakeholder analysis or even mind mapping. Why are you creating videos in front of a 144 port switch?
  • gwlong
    gwlong at September 18,2017
    I use Kali for a lot of my pentesting stuff, but I haven't dabbled in the arpspoofing as much as of yet. It was a nice little introduction to see more the network side of things in terms of directly listening on the wlan, definitely piques my curiosity!
  • Digger62
    Digger62 at September 19,2017
    Very interesting toolsets here. Being new to the Computer Forensics field I am noticing some similarities to other tools I have used for analysis. Maltego especially. As an analyst I can truly appreciate the value and power of these tools. The part I find fascinating to me though is amount of tools out there that I had no idea existed. I know of some but I am now at the point of sensory overload. How does one determine which toolsets are the best for a given scenario? As pointed out in a module when both tools returned information but one provided a false count whereas the other provided a true count. I am assuming a lot of this comes from experience with the various toolsets but it still makes me wonder which is the correct answer when both provide answers and are considered trusted tools. Backtrack appears to be a powerhouse from my very limited knowledge set. I am sure there must be others that make this tool seem like child's play.
  • cmarti
    cmarti at September 28,2017
    Backtrack with data reconinsence. in use of maltego software to extract information on the internet and gatering information with the creation of graphs and searches. Using Arp and NMAP is how we can find IP addresses. We can find Ports, addresses, MAC addresses, DNS, Motherboard information. As a Pen-tester you can show your client a network actually is.
  • nparke
    nparke at September 28,2017
    This video did a very good job showing the tutorial for some tools on BackTrack. The short explanations on why it is useful for penetration testing was useful to know. But the number of tools that BackTrack (now Kali) has can be overwhelming. It is nice to have a go to technique when pen testing - especially when you have to decide how you want to gather information on the subject.
    • «
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved