Главная
Study mode:
on
1
Intro
2
Overview
3
What Are Exploit Kits
4
How do you get compromised
5
Angler Exploit kit
6
Angler Effectiveness
7
Research Methodology
8
Bad Domain Right....Wrong
9
What is Domain Shadowing
10
Evolution
11
Domain Shadowing Explodes
12
Attacking the Weakest Link
13
Landing Page Shenanigans
14
302 Cushioning
15
URL Structure Landing
16
URL Structure Exploit
17
Payloads
18
Detection
19
Casting a Long Shadow
20
Spot the Exploit Kit
21
Bonus Hunting Pro Tip
22
Summary
Description:
Dive into the world of cybersecurity with this 46-minute conference talk from BSidesLV 2015, exploring the Angler Exploit Kit and domain shadowing techniques. Learn about exploit kits, infection methods, and the evolution of domain shadowing attacks. Discover research methodologies, landing page tactics, and URL structures used by cybercriminals. Gain insights into payload delivery, detection methods, and practical tips for identifying exploit kits. Enhance your understanding of cybersecurity threats and defense strategies through this comprehensive presentation by Nick Biasini.

Angler Lurking in the Domain Shadows

BSidesLV
Add to list