主页 / ISC2016 中国互联网安全大会 / Tracking Exploit Kits
-
作者John Bambenek Manager of Threat Systems Fidelis Cybersecurity
-
简介
- Why track exploit kits?
- Intelligence Priorities
- What is an Exploit Kit?
- Exploit Kits
- Campaign IDs
- Locky Example
- Data-mining malware
- Basic EK Process
- Magnitude to Cerber example
- Exploit Kit URLs often have patterns
- Non-Attributable Networks
- Exploit hunting
- Decoding EK landing pages
- Other Cuckoo considerations
- Finding EK landing pages
- Working backwards from an infection
- Using PCREs to hunt
- Using a crawler
- Using Bing Malicious URLs
- Bing Malicious URLs
- Trick EKs to give you landing pages
- Putting it together
-
援引http://security.360.cn/News/news/id/89.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-09-05 13:43:26
-
2020-04-15 05:21:08
-
2016-03-13 14:59:11
-
2019-01-04 06:49:35
附件下载
-
John.Bambenek.Tracking.Exploit.Kits.pdf