Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Exploit Kit intro

 

Rating :

 

Comments

 
  • mtrapp
    mtrapp at April 16,2018
    In my opinion, the orator really did not cover the topic very well. He mentioned exploit kits, but went off topic towards debugging a particular exploit (Holla). However, he didn't cover the debugging as well as the OllyDbg videos did.
  • lwalke
    lwalke at April 29,2018
    I think he did a great job with this video, But I will have to agree with mtrapp. I would have like to had a little more detail about debugging exploits like (Holla). The videos will be a great start for individuals wanting to understand what exploit kits are.
  • osufitchi
    osufitchi at May 01,2018
    I don't think exploit kits should be limited to common software. There is value in an attacker researching any specific software that a small organization relies on. If it's a specific software that does not come from a large vendor, it is more likely to have unpatched vulnerabilities. My opinion: although not casting a wide net means more work on the attacker's side, exploit kits should still be just as developed for less-common software as well.
  • djoseph4
    djoseph4 at May 04,2018
    I think it would help to have demos of a few different exploits in action because it may help make the concepts he is trying to explain a bit more clear. Overall, the video is a good intro to the topic, but the audience should do more research to get deeper into the topic.
  • kzurowsk
    kzurowsk at June 15,2018
    I think that osufitchi makes a good point, regarding less common software. In general, I think that using general software is a better strategy for successfully attacking more targets. However, targeting less used software can give valuable research, either for researchers, or for attackers who have a very specific target. I could be an area with a lot of opportunities (and vulnerabilities!)
    • «
    • 1
    • 2
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved