Exploit Kit Cornucopia
Detecting the compromised websites, gates, and dedicated hosts that make up the infrastructure used by Exploit Kits involves a variety of creative techniques. In this session, we will detail four approaches to uncovering these systems while explaining the underlying architecture of Exploit Kit networks.
By Brad Antoniewicz & Matt Foley
Full Abstract: https://www.blackhat.com/us-17/briefi...
Exploit Kit Cornucopia
Reviewed by Anonymous
on
February 22, 2018
Rating: