Главная
Study mode:
on
1
Introduction
2
Welcome
3
Background
4
Website
5
Obstacle Page
6
Previous research
7
Scheduling application
8
Reverse engineering
9
In the real world
10
Data complicity
11
Highlevel picture
12
Normalization
13
Rotation
14
Color Structure
15
Similarity
16
Stream Crossing
17
Hierarchical Crossmark
18
Passive Threshold
19
Analysis
20
Life Cycle
21
New Version
22
Angular is Poor Kid
23
Application Engine Change
24
Conclusion
25
Outro
Description:
Explore the next generation of exploit kit detection through the construction of simulated obfuscators in this Black Hat conference talk. Delve into the world of driving-by downloads attacks and the role of exploit kits in malware delivery. Learn about the key obfuscation techniques used to evade firewall detection and the limitations of current research approaches. Discover how rebuilding obfuscators for six notorious exploit kit families can benefit cybersecurity research. Examine the design and implementation of these simulated obfuscators, their evaluation process, and the insights gained from generating a vast array of samples. Investigate the evolution of obfuscators within each exploit kit family and explore potential predictions for future variations. Challenge current variation naming conventions and consider a new approach based on actual obfuscator changes. Gain valuable knowledge on the amplification effect of obfuscator modifications on obfuscated pages and its implications for cybersecurity. Read more

Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators

Black Hat
Add to list
0:00 / 0:00