Главная
Study mode:
on
1
Introduction
2
HP DV Labs
3
Muleta
4
Pricing
5
KV Securities Blog
6
How Exploit Kits Work
7
Blackhole
8
Timeline of 2011
9
Trend Micro paper
10
Blackhole Control Panel
11
Java Rhino
12
Reddit
13
Control Panel
14
JavaScript
15
Shellcode
16
IP sched
17
DNS generation
18
Phoenix
19
Phoenix Statistics
20
Phoenix obfuscations
21
Other exploit kits
22
YangPack
23
SweetOrange
24
General Statistics
25
Nuclear Pact
26
Anti Calling
27
Conclusion
28
Questions
Description:
Explore the world of web exploit toolkits in this 42-minute Black Hat USA 2012 conference talk. Dive deep into popular exploit kits like Blackhole and Phoenix, as well as emerging players from Asia. Gain insights into kit construction, shellcode analysis, obfuscation techniques, and exploit patterns. Learn about data harvesting methods and current trends in cybercriminal tactics. Examine pricing models, control panels, and JavaScript obfuscation techniques used by various exploit kits. Understand the timeline of significant events in 2011 and their impact on the exploit kit landscape. Discover how exploit kits leverage Java Rhino, DNS generation, and anti-calling mechanisms. Compare statistics and features across different exploit kits, including YangPack, SweetOrange, and Nuclear Pack. Equip yourself with knowledge to better comprehend and combat web-based threats in this comprehensive overview of the state of web exploit toolkits.

State of Web Exploit Toolkits

Black Hat
Add to list
0:00 / 0:00