Exploit Kit Cornucopia

s6_faEjf4AQ/default.jpg

Detecting the compromised websites, gates, and dedicated hosts that make up the infrastructure used by Exploit Kits involves a variety of creative techniques. In this session, we will detail four approaches to uncovering these systems while explaining the underlying architecture of Exploit Kit networks.

By Brad Antoniewicz & Matt Foley

Full Abstract: https://www.blackhat.com/us-17/briefi...

s6_faEjf4AQ/default.jpg
Exploit Kit Cornucopia Exploit Kit Cornucopia Reviewed by Anonymous on February 22, 2018 Rating: 5