Главная
Study mode:
on
1
Introduction
2
Overview
3
Assembly Line
4
How do users get compromised
5
Anglers innovation
6
Angler exploits
7
Zeroday campaigns
8
Domains
9
Kevin Spann Net
10
Core Domain
11
Domain Tools
12
What I Found
13
Domain Shadowing
14
How Big of a Deal
15
Fishing
16
Why Register
17
Domain Shadows
18
Landing Page Nanigans
19
URL Structure Changes
20
Exploit Structure Changes
21
Payloads
22
Detection
23
Random Domains
24
Exploit Kit
25
Hunting Pro Tip
26
Angler Exploit Kits
27
Questions
Description:
Explore the world of cyber threats in this 46-minute conference talk from BSidesLV 2015. Delve into the intricacies of Angler Exploit Kits and domain shadowing techniques. Learn about the assembly line of cyber attacks, user compromise methods, and Angler's innovative approaches. Examine real-world examples, including the Kevin Spann NetCore Domain case. Understand the significance of domain shadowing, its fishing techniques, and the reasons behind domain registrations. Analyze URL and exploit structure changes, payload delivery methods, and detection strategies. Gain valuable insights into random domain generation and exploit kit hunting pro tips. Enhance your cybersecurity knowledge with this comprehensive overview of Angler's lurking threats in the domain shadows.

Angler Lurking in the Domain Shadows

Add to list