主页 / ISC2016 中国互联网安全大会 / Tracking Exploit Kits
  • 作者
    John Bambenek Manager of Threat Systems Fidelis Cybersecurity
  • 简介
    • Why track exploit kits?
    • Intelligence Priorities
    • What is an Exploit Kit?
    • Exploit Kits
    • Campaign IDs
    • Locky Example
    • Data-mining malware
    • Basic EK Process
    • Magnitude to Cerber example
    • Exploit Kit URLs often have patterns
    • Non-Attributable Networks
    • Exploit hunting
    • Decoding EK landing pages
    • Other Cuckoo considerations
    • Finding EK landing pages
    • Working backwards from an infection
    • Using PCREs to hunt
    • Using a crawler
    • Using Bing Malicious URLs
    • Bing Malicious URLs
    • Trick EKs to give you landing pages
    • Putting it together
  • 援引
    http://security.360.cn/News/news/id/89.html
  • 提示
    本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
附件下载
  • John.Bambenek.Tracking.Exploit.Kits.pdf
    时间: 大小: 6.83 M 下载: 21