Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • mariawhit8
    mariawhit8 at February 23,2015
    I've heard a lot about Backtrack but I've never sat down to learn about it's capabilities. It seems like a one stop shop for a lot of pen test/network tools used even by system admins to troubleshoot their network and harden any exploitable areas. Nice overview of Transforms for correlating relationships between objects which seems rather helpful in investigative tasks. Nice GUI to allow you to play and learn.
  • gmazur
    gmazur at February 25,2015
    This video is apparently a few years old. Back Track (BT) is no longer supported and was replaced by Kali Linux. I do not recall the reasoning, but it went from a Ubuntu distribution of Linux to Debian Linux. Kali contains much if not all of the same capabilities of BT, information gathering, reconnaissance, penetration testing, exploitation, forensics, and anti-forensics all in one place in a fairly user friendly environment. It can be a bit dangerous to use especially for those who do not understand the effects both intended and collateral. Really like the Maltego explanation, especially with the prevalence of social media. Puts into perspective how easy it is to research people. The rest of the video is a good presentation on how easy it is to learn and use all the tools on Kali.
  • connellyt
    connellyt at February 28,2015
    Even though it's changed its name, most of the tools in the video are still on Kali. When watching the video, it definitely helps to go full screen so you can see what he's typing. The company that maintains the Kali distro also has some training they offer that is inexpensive compared to SANS, but I've heard good things about it.
  • nbodyk
    nbodyk at March 03,2015
    Interesting video. Provides and overview and demonstration of what Back Track can do and how it can help you with pen testing and determining the vulnerability of your network. Being able to see what ports are still open when your firewall is on is useful so you know the risks to your network. It's interesting to note that you can use the tool to monitor what employees are doing on the network. This way you can make sure your employees are not doing unauthorized activity on the network.
  • jczarny
    jczarny at March 08,2015
    Very good video regarding Back Track, and now after watching this I am interested in doing more research on Kali's updated features. I have the R3 distribution of Back track I was given for some training awhile back, and I am now more motivated to load it up into a VM and play around with the maltego plugin. Who wants to give me written consent to act as a target?
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved