This document summarizes a presentation on hunting web malware as a "good hacker" or malware hunter. It discusses browser malware taxonomy, strategies attackers use to infect websites like iframe injections and compromised servers, and methodology for analyzing website traffic dumps to extract malware. It includes two case studies: one on taking down the BlackHole Exploit Pack and another on conducting a SQL injection attack against a SpyEye botnet command and control server. The presentation emphasizes the penetration testing skills and understanding of malware and exploits needed to rigorously hunt for web malware.