Explore the world of cyber threats in this 46-minute conference talk from BSidesLV 2015. Delve into the intricacies of Angler Exploit Kits and domain shadowing techniques. Learn about the assembly line of cyber attacks, user compromise methods, and Angler's innovative approaches. Examine real-world examples, including the Kevin Spann NetCore Domain case. Understand the significance of domain shadowing, its fishing techniques, and the reasons behind domain registrations. Analyze URL and exploit structure changes, payload delivery methods, and detection strategies. Gain valuable insights into random domain generation and exploit kit hunting pro tips. Enhance your cybersecurity knowledge with this comprehensive overview of Angler's lurking threats in the domain shadows.