Главная
Study mode:
on
1
Intro
2
Introductions
3
Agenda
4
Background
5
Michelle
6
NYC Running Mama
7
Exploit Kit
8
Exploit Kit Tracker
9
Detecting Exploit Kits
10
Vagrant
11
Filter
12
Proxy Network
13
Browser Scraper
14
Decoder
15
Squid Proxy
16
What to scrape
17
Hitless
18
Lambda
19
Data Visualization
20
Backdoor
21
Hash
22
User IDs
23
Post Data
24
Brute Force
25
Email honey pots
26
Disposable mailbox
27
Mail Runner
28
lacedmailcom
29
Exploit Kits
30
The Magic Address
31
Overwrite
32
Recap
Description:
Explore four innovative approaches to uncovering compromised websites, gates, and dedicated hosts that form the infrastructure of Exploit Kits in this 45-minute Black Hat conference talk. Delve into the underlying architecture of Exploit Kit networks while learning about detection techniques such as Vagrant, FilterProxy Network, Browser Scraper, and Decoder. Discover the intricacies of data visualization, backdoor hashing, user ID analysis, and post-data examination. Gain insights into brute force methods, email honeypots, disposable mailboxes, and the concept of "The Magic Address." Enhance your understanding of Exploit Kits and their detection through this comprehensive presentation by Brad Antoniewicz and Matt Foley.

Exploit Kit Cornucopia

Black Hat
Add to list
0:00 / 0:00