YoVDO

Angler Lurking in the Domain Shadows

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Incident Response Courses Research Methodology Courses Threat Detection Courses Exploit Kits Courses

Course Description

Overview

Dive into the world of cybersecurity with this 46-minute conference talk from BSidesLV 2015, exploring the Angler Exploit Kit and domain shadowing techniques. Learn about exploit kits, infection methods, and the evolution of domain shadowing attacks. Discover research methodologies, landing page tactics, and URL structures used by cybercriminals. Gain insights into payload delivery, detection methods, and practical tips for identifying exploit kits. Enhance your understanding of cybersecurity threats and defense strategies through this comprehensive presentation by Nick Biasini.

Syllabus

Intro
Overview
What Are Exploit Kits
How do you get compromised
Angler Exploit kit
Angler Effectiveness
Research Methodology
Bad Domain Right....Wrong
What is Domain Shadowing
Evolution
Domain Shadowing Explodes
Attacking the Weakest Link
Landing Page Shenanigans
302 Cushioning
URL Structure Landing
URL Structure Exploit
Payloads
Detection
Casting a Long Shadow
Spot the Exploit Kit
Bonus Hunting Pro Tip
Summary


Taught by

BSidesLV

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Microsoft Professional Capstone : Cybersecurity
Microsoft via edX
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn