Главная
Study mode:
on
1
Intro
2
Sourcefire VRT Overview
3
Sourcefire Pig
4
What is an exploit kit
5
Why do exploit kits matter
6
How do exploit kits work
7
Email sample
8
How to build
9
Smart fishers
10
What happens when you click on a link
11
Loading please wait
12
Chain of redirections
13
Standardized behavior
14
Dropping payload
15
How does it work
16
Infinite variability
17
Sneaky tricks
18
Signatures
19
Drop Exploits
20
Java Exploits
21
PDFs
22
Generic Detection
23
Disguising executables
24
FireAmp
25
KZ
26
Domain Generation
27
False Positives
28
Fishing
29
Sourcefire
30
Feedback
31
Microsoft
32
Questions
Description:
Explore the life cycle and detection methods of exploit kits in this conference talk from SkyDogCon 2. Delve into the Sourcefire VRT overview and learn about the significance of exploit kits in cybersecurity. Understand the mechanics behind exploit kits, including email samples, smart fishing techniques, and the chain of redirections. Examine standardized behaviors, payload dropping, and the infinite variability of these threats. Discover sneaky tricks employed by attackers and various signature-based detection methods for Java exploits, PDFs, and disguised executables. Gain insights into generic detection techniques, domain generation algorithms, and the challenges of false positives. Conclude with a discussion on fishing techniques, Sourcefire's approach, and engage in a Q&A session covering Microsoft-related topics.

Life Cycle and Detection of an Exploit Kit

Add to list
0:00 / 0:00