The document discusses web exploitation kits, which are tools that allow attackers to gain control of client machines through drive-by downloads from malicious web servers. It analyzes three popular kits - WebAttacker, MPack, and IcePack - to answer questions from a previous study of malicious web servers. The document finds that (1) IP tracking functionality in the kits explains why servers sometimes stop showing malicious behavior, (2) multiple browsers are targeted through exploits of plugins, and (3) obfuscation is commonly used to generate attack code and evade detection.