文 档: Tracking Exploit Kits
作 者: John Bambenek Manager of Threat Systems Fidelis Cybersecurity
语 言: 外文
标 签 exploit Exploit Kit
介 绍:
  • Why track exploit kits?
  • Intelligence Priorities
  • What is an Exploit Kit?
  • Exploit Kits
  • Campaign IDs
  • Locky Example
  • Data-mining malware
  • Basic EK Process
  • Magnitude to Cerber example
  • Exploit Kit URLs often have patterns
  • Non-Attributable Networks
  • Exploit hunting
  • Decoding EK landing pages
  • Other Cuckoo considerations
  • Finding EK landing pages
  • Working backwards from an infection
  • Using PCREs to hunt
  • Using a crawler
  • Using Bing Malicious URLs
  • Bing Malicious URLs
  • Trick EKs to give you landing pages
  • Putting it together
援 引: http://security.360.cn/News/news/id/89.html
附件下载
相关推荐
Win32 缓冲区溢出实战
  • 漏洞挖掘,fuzz,exploit,溢出
很多次被朋友邀请写篇关于在Win32下Exploit的文章。一来是因为此 类文章
Tracking Exploit Kits
  • exploit,Exploit Kit
- Why track exploit kits? - Intelligenc
阅读心得