Hello to all,
I have little skill in English writing.excuse me
I am trying to understand a specific malware behavior that is used by "Drive-by downloads".
specially this questions:
1.What file is downloaded in attack ?
2. What exploit is used to attack ?
3. What domain is redirected and etc
for example in BLADE evaluation lab, some malware URL listed that use Drive-by download.
http://www.blade-defender.org/eval-lab/
i want to understand the exact attack scenario step by step of each url that list in BLADE
Notice: there are many website that make report with full detail but they don't say the mechanism. Please help me!
I have little skill in English writing.excuse me
I am trying to understand a specific malware behavior that is used by "Drive-by downloads".
specially this questions:
1.What file is downloaded in attack ?
2. What exploit is used to attack ?
3. What domain is redirected and etc
for example in BLADE evaluation lab, some malware URL listed that use Drive-by download.
http://www.blade-defender.org/eval-lab/
i want to understand the exact attack scenario step by step of each url that list in BLADE
Notice: there are many website that make report with full detail but they don't say the mechanism. Please help me!