Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
View analytic
Sunday, February 12 • 4:50pm - 5:20pm
Tired of Playing Exploit Kit Whack-A-Mole? Let's automate

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.

Exploit Kits (EKs) have been very successful in delivering tailor made exploits and spreading malware. EK as a service has lowered the bar of entry for attackers, enabling wide-spread malware infections. Defenders have been using dynamic analysis tools like Cuckoo sandbox and JavaScript de-obfuscators like JSDetox and Revelo to detect and analyze EKs, but these approaches don’t scale very well across billions of websites. In this talk, I'll discuss a new technique to crawl the web at scale and detect EKs using headless browsers equipped with JavaScript and DOM inspectors. I’ll demonstrate a proof of concept and unravel the behavior of some of the latest EKs hiding in plain sight.

 


Speakers
AA

Anjum Ahuja

Anjum is a Threat Researcher at Endgame, working on problems related to network security, malwares, and large scale data analysis. He has a background in computer networks, routing and IOT security, and holds multiple patents in these fields. Anjum holds a Masters in computer science from Johns Hopkins University.


Sunday February 12, 2017 4:50pm - 5:20pm
DNA Lounge