- Mastering Reverse Engineering
- Reginald Wong
- 297字
- 2021-06-10 19:40:27
Exploits and compromised websites
Exploits are also categorized under malware. Exploits are crafted to compromise specific vulnerabilities of software or network services. These are usually in the form of binary data. Exploits take advantage of vulnerability, thereby causing the target software or service to behave in such a manner that the attacker intends it should behave. Usually, the attacker intends to gain control over the target system or simply take it down.
Once an attacker identifies vulnerabilities on its target, an exploit is crafted containing code that would download malware that can give the attacker more access. This concept was used to develop exploit kits. Exploit kits are a set of known vulnerability scanners and known exploits packaged as a toolkit.
The following diagram gives an example:

In a malware campaign, social engineering is used to lure users to visit links that are actually compromised. Usually, the compromised sites were manually hacked and have been injected with a hidden script that redirects to another website. The malicious links are spammed to email messages, instant messaging, and social networking sites. Visiting legitimate sites that are compromised with malicious advertisements also counts as bait. These sites include software or media piracy sites, the dark web, or even pornographic sites. Once the user clicks the link, typically, the site redirects to another compromised site, and to another, until it reaches the exploit kit landing gate page. From the user's internet browser, the exploit kit gate gathers information on the machine, such as software versions, and then determines whether or not the software is known to be vulnerable. It then delivers all exploits applicable to the vulnerable software. The exploits typically contain code that will download and execute malware. As a result, the unaware user gets a compromised system.
- Node Security
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- INSTANT Burp Suite Starter
- 網絡空間安全:管理者讀物
- 深入淺出隱私計算:技術解析與應用實踐
- 反黑命令與攻防從新手到高手(微課超值版)
- 防火墻技術與應用(第2版)
- 學電腦安全與病毒防范
- Kerberos域網絡安全從入門到精通
- 構建新型網絡形態下的網絡空間安全體系
- 網絡空間安全:拒絕服務攻擊檢測與防御
- Manga Studio 5 Beginner's Guide
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- Instant OSSEC Host-based Intrusion Detection System
- 黑客攻防從入門到精通:實戰篇(第2版)