Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • hanna88
    hanna88 at November 25,2015
    The comments indicate that a lot of people have used either BackTrack or something similar--this is completely new to me. I thought this particular video was good at breaking things down for those of us that have never used any penetration testing-type tools. The Maltego stuff looks like it has a nice interface...I like how there is a nice display of all of the relations that you can then narrow down and transform selected links.
  • brober15
    brober15 at December 10,2015
    I was familiar with Kali, but hadn't known there was a predecessor. It's nice for penetration testers to have an OS with many of the necessary tools already built in. Maltego seems like a very interesting tool, it can be helpful to visualize the data discovery process.
  • busterhax
    busterhax at December 10,2015
    This is an excellent introduction video to backtrack/kali. It's also a reminder that you must have knowledge of multiple subjects in order to do a single task.
  • haygaff
    haygaff at December 19,2015
    Gathering information and getting prepared for the attack is like training for a race. "Victory favors those that prepare." I am not sure who said that but it was a quote from a book I read. Great tool that shows link analysis for a particular topic. You can then transform each link into inner dependancies.
  • CCotton10
    CCotton10 at February 10,2016
    This video shows a number of tools I have not been exposed to previously. It helped to demonstrate ways in which you could look for network vulnerabilities and demonstrate to potential clients where they were. In addition, at the beginning of the video there was information on who to look for connections between two pieces of information, like an email address and a facebook account. This looked like an interesting tool.
    • «
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved