YoVDO

Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses APIs Courses

Course Description

Overview

Explore a comprehensive analysis of modern exploit kit infrastructure and counter-attack strategies in this 59-minute Black Hat conference talk. Delve into the sophisticated networks employed by exploit kit-as-a-service operators, including proxies, gates, VDS, rotators, uploaders, panel servers, and APIs. Learn about counter-infiltration techniques, such as decoying proxies and revealing hidden IPs, as presented by Yin Minn Pa Pa, Hiroshi Kumagai, Masaki Kamizono, and Takahiro Kasama. Examine case studies of popular exploit kits like RIG 4.0, BEPS, Hunter, and Neptune, comparing their attack infrastructures. Gain insights into future possibilities, leaked exploit kits, and code reuse in the evolving landscape of cybersecurity threats and defenses.

Syllabus

Intro
Motivation
Method
Outline
Panel Server (Admin)
Panel Server (User)
API for Proxy
Inside the Leaked DB
API Link
Decoying Proxies
Reveal the Hidden IP
blackhat Peaking Attackers
black hat RIG 4.0 - Attack Summary
The Rich?
black hat BEPS - Attack Infrastructure
black hat Hunter - Attack Infrastructure
black hat Neptune - Attack Infrastructure
Future Possibilities
Leaked Exploit Kits
black hat Old Days vs New Days
Code Reuse
Conclusion


Taught by

Black Hat

Related Courses

Web Development
Udacity
Do-It-Yourself Geo Apps
Esri via Independent
Software Construction: Object-Oriented Design
The University of British Columbia via edX
Full-Text Search with SAP HANA Platform
SAP Learning
Tools for Data Science
IBM via Coursera