Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure

Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure

Black Hat via YouTube Direct link

Method

3 of 22

3 of 22

Method

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Motivation
  3. 3 Method
  4. 4 Outline
  5. 5 Panel Server (Admin)
  6. 6 Panel Server (User)
  7. 7 API for Proxy
  8. 8 Inside the Leaked DB
  9. 9 API Link
  10. 10 Decoying Proxies
  11. 11 Reveal the Hidden IP
  12. 12 blackhat Peaking Attackers
  13. 13 black hat RIG 4.0 - Attack Summary
  14. 14 The Rich?
  15. 15 black hat BEPS - Attack Infrastructure
  16. 16 black hat Hunter - Attack Infrastructure
  17. 17 black hat Neptune - Attack Infrastructure
  18. 18 Future Possibilities
  19. 19 Leaked Exploit Kits
  20. 20 black hat Old Days vs New Days
  21. 21 Code Reuse
  22. 22 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.