YoVDO

Angler Lurking in the Domain Shadows

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Incident Response Courses Research Methodology Courses Threat Detection Courses Exploit Kits Courses

Course Description

Overview

Dive into the world of cybersecurity with this 46-minute conference talk from BSidesLV 2015, exploring the Angler Exploit Kit and domain shadowing techniques. Learn about exploit kits, infection methods, and the evolution of domain shadowing attacks. Discover research methodologies, landing page tactics, and URL structures used by cybercriminals. Gain insights into payload delivery, detection methods, and practical tips for identifying exploit kits. Enhance your understanding of cybersecurity threats and defense strategies through this comprehensive presentation by Nick Biasini.

Syllabus

Intro
Overview
What Are Exploit Kits
How do you get compromised
Angler Exploit kit
Angler Effectiveness
Research Methodology
Bad Domain Right....Wrong
What is Domain Shadowing
Evolution
Domain Shadowing Explodes
Attacking the Weakest Link
Landing Page Shenanigans
302 Cushioning
URL Structure Landing
URL Structure Exploit
Payloads
Detection
Casting a Long Shadow
Spot the Exploit Kit
Bonus Hunting Pro Tip
Summary


Taught by

BSidesLV

Related Courses

Hunting for Exploit Kits
YouTube
Malware Analysis: Types, Classification, and Analysis Techniques
Bill Buchanan OBE via YouTube
Exploit Kit Cornucopia
Black Hat via YouTube
Browser Instrumentation for Exploit Analysis - DefCamp 2016
DefCamp via YouTube
Adventures with Cybercrime Toolkits - Insights for Pragmatic Defense
USENIX Enigma Conference via YouTube