Ready to Start Your Career?

[podcast] Earl Carter dissects the Angler Exploit Kit

BrBr 's profile image

By: BrBr

June 7, 2016

[embed][/embed]Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the#Angler EK.He starts us off with a history or where it came from and how it gained so much popularity, evolving from earlier EKs, like#BlackHole, or WebAttacker. We even discuss how it's gone from drive-by downloads, to running only in memory, to being used in malvertising campaigns. We even get to hear about how the creators "rent" out the Angler EK, and how they also control the malvertising side as well. Great insights into how the Angler EK eco-system operates...We are also adding some vocabulary to your dictionary... find out what "302 Cushioning" and "Domain Shadowing" are, and why your blue teamers should be more vigilant about monitoring your domain registrar...We talk about some of the vulns used by exploit kits. Contrary to popular belief, the vulns used don't always have to be 0day. Blue teamers will learn valuable insights in protecting your networks from this EK.Direct Link: Links referenced during the show:Earl's slides from Bsides Austin:  

Comments, Questions, Feedback:

Support Brakeing Down Security Podcast on Patreon: @brakesec @boettcherpwned @bryanbrake#Facebook: : Network: Radio App: 
Schedule Demo