Adventures with Cybercrime Toolkits - Insights for Pragmatic Defense

Adventures with Cybercrime Toolkits - Insights for Pragmatic Defense

USENIX Enigma Conference via YouTube Direct link

Controlled probing of exploit kits to milk behavioral fingerprint

4 of 12

4 of 12

Controlled probing of exploit kits to milk behavioral fingerprint

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Adventures with Cybercrime Toolkits - Insights for Pragmatic Defense

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Adventures with Cybercrime Toolkits: Insights for Pragmatic Defense
  3. 3 Probing exploit kits to milk behavioral fingerprints
  4. 4 Controlled probing of exploit kits to milk behavioral fingerprint
  5. 5 Leveraging blind spots in exploit kits to turn the table on cybercriminals
  6. 6 Take advantage of flaws in exploit kit code to fight back
  7. 7 Who will be using such a strategy and and for what?
  8. 8 Defense capability gained
  9. 9 How complex is a concrete exploit?
  10. 10 Lesson for pragmatic defense
  11. 11 In the cybercrime arms race, how do we improve the state of defense?
  12. 12 Takeaways 1: Just Like defenders, cybercriminals have blind spots in coding, configuration, and deployment of their exploit toolkits.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.