Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Web Exploit Finder
Detecting Drive-By-Downloads
in a virtualized environment




Benjamin Mack
xnos Internet Services
About Benjamin Mack

   Student of „computer science and media“ at the Hochschule
    der Medien, Stuttgart since 2003


...
Agenda

   The Problem

   What are malicious websites?

   Our Approach
      Features
      Architecture
      Roo...
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Web Exploit Finder Presentation
Upcoming SlideShare
Loading in …5
×

Web Exploit Finder Presentation

  • Be the first to comment

Web Exploit Finder Presentation

  1. 1. Web Exploit Finder Detecting Drive-By-Downloads in a virtualized environment Benjamin Mack xnos Internet Services
  2. 2. About Benjamin Mack  Student of „computer science and media“ at the Hochschule der Medien, Stuttgart since 2003  Started xnos Internet Services for Hosting, Security and Web Development in 2006  Finishing my diploma thesis in late 2007  Also involved in TYPO3 core development © Benjamin Mack, xnos Internet Services, www.xnos.de, June 1st 2007
  3. 3. Agenda  The Problem  What are malicious websites?  Our Approach  Features  Architecture  Rootkit  Fast reproduction of virtual clients  Inspecting a website  State Future Plans © Benjamin Mack, xnos Internet Services, www.xnos.de, June 1st 2007

×