Главная
Study mode:
on
1
Intro
2
ABOUT ME
3
OVERVIEW
4
INFECTION PROCESS
5
PROBLEM: COLLECTION ON EXPLOIT KITS
6
MAXWELL ARCHITECTURE
7
WHITELIST EXAMPLE
8
MAXWELL ARCHITECUTRE
9
VIRTUAL MACHINE CONFIG
10
ANTI-RESEARCHER
11
POST PROCESSING
12
PUTTING IT ALL TOGETHER
13
SUMMARY
14
REFERENCES
Description:
Explore the world of exploit kits in this 36-minute conference talk from Derbycon 2016. Dive into the infection process, challenges in collecting data on exploit kits, and the innovative Maxwell architecture. Learn about whitelist examples, virtual machine configurations, and anti-researcher techniques. Discover post-processing methods and how to integrate all components effectively. Gain valuable insights into this critical aspect of cybersecurity, complete with references for further study.

Hunting for Exploit Kits

Add to list