haneenat February 11,2016 I think it's a good technique to use during interception, it is light as it uses cmd, and the good thing about it that it gives us the content that the traffic carries.
tcmahonyat February 25,2016 A couple things about this video that stood out to me are that there is more than one way to gather information about targets and I think it also drives home that information gathering is very important part of the process when it comes to pentesting. Having a robust set of information to build upon even in a forensics case can help greatly. It was nice to see that the author of this video didn't just run nmap scans and that he ran nmap in stealth mode. As many organizations may run intrusion detection systems, running nmap in stealth mode will help prevent detections by IDS. Additionally while the author used arpspoof in this video, from my experience, that can be easily detected on a network and seems odd that they would recommend using it given that they used the stealth scan with nmap.
nickat March 08,2016 I was a bit disappointed in this video's quality. The background noise was a bit distracting and the resolution was not that great. The presenter should have really tried to overcome these issues prior to creating the video. Additionally, the video, in my opinion didn't flow very well. The different sections of the video didn't always build off of one another. It would have been useful, for instance if the presenter provided some context when, for instance he selected nmap, as opposed to the numerous other utilities under the Identify live hosts menu. With that being said, the Maltego demonstration was very interesting and it was a decent, high level demonstration of BackTrack.
fpazdzinat March 10,2016 I’m sure he was just scratching the surface on what this program can do. You can probably spend hours just going through and learning all of its features. This is definitely a great tool for gathering information. It seems like it will be able to tell you everything you want to know about what’s going on in your network. Plus, that image capturing feature could be very useful. Though I wonder if it only captures picture images or if it can also capture images of files being sent over the network.
BrianDaugetteat April 06,2016 I had a hard time trying to determine the target audience for this video. He skips over explaining some things which I assume means he expects his audience to know what they are, but he never explains how what he is doing may be useful, or how it fits into a bigger picture of penetration testing a network. For instance, when he uses Maltego to do "transforms." Based on the context I'm assuming it's showing relationships between IP addresses, domains, email addresses, etc., but he never explains how he uses that information in conjunction with the other tools he demonstrates to pen test a network. It seemed like he just mishmashed a few tool demos into a single video without going deep enough in to the tools to be a good explaination of them, but he also doesn't give enough of an overview of how the tools are used together during a pen test for it to be a good video that just summarizes the tools.