Completed
Disguising executables
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Life Cycle and Detection of an Exploit Kit
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Sourcefire VRT Overview
- 3 Sourcefire Pig
- 4 What is an exploit kit
- 5 Why do exploit kits matter
- 6 How do exploit kits work
- 7 Email sample
- 8 How to build
- 9 Smart fishers
- 10 What happens when you click on a link
- 11 Loading please wait
- 12 Chain of redirections
- 13 Standardized behavior
- 14 Dropping payload
- 15 How does it work
- 16 Infinite variability
- 17 Sneaky tricks
- 18 Signatures
- 19 Drop Exploits
- 20 Java Exploits
- 21 PDFs
- 22 Generic Detection
- 23 Disguising executables
- 24 FireAmp
- 25 KZ
- 26 Domain Generation
- 27 False Positives
- 28 Fishing
- 29 Sourcefire
- 30 Feedback
- 31 Microsoft
- 32 Questions