YoVDO

Angler Lurking in the Domain Shadows

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Incident Response Courses Research Methodology Courses Threat Detection Courses Exploit Kits Courses

Course Description

Overview

Dive into the world of cybersecurity with this 46-minute conference talk from BSidesLV 2015, exploring the Angler Exploit Kit and domain shadowing techniques. Learn about exploit kits, infection methods, and the evolution of domain shadowing attacks. Discover research methodologies, landing page tactics, and URL structures used by cybercriminals. Gain insights into payload delivery, detection methods, and practical tips for identifying exploit kits. Enhance your understanding of cybersecurity threats and defense strategies through this comprehensive presentation by Nick Biasini.

Syllabus

Intro
Overview
What Are Exploit Kits
How do you get compromised
Angler Exploit kit
Angler Effectiveness
Research Methodology
Bad Domain Right....Wrong
What is Domain Shadowing
Evolution
Domain Shadowing Explodes
Attacking the Weakest Link
Landing Page Shenanigans
302 Cushioning
URL Structure Landing
URL Structure Exploit
Payloads
Detection
Casting a Long Shadow
Spot the Exploit Kit
Bonus Hunting Pro Tip
Summary


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network