Anatomy of exploit kits: preliminary analysis of exploit kits as software artefacts

  • Authors:
  • Vadim Kotov;Fabio Massacci

  • Affiliations:
  • DISI - University of Trento, Italy;DISI - University of Trento, Italy

  • Venue:
  • ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind drive-by-download attacks. The analysis shows that exploit kits make use of a very limited number of vulnerabilities and in a rather unsophisticated fashion. Their key strength is rather their ability to support "customers" in avoiding detection, monitoring traffic, and managing exploits.