blog
April 3, 2009
It is well known that most drive-by downloads rely on exploit toolkits to fingerprint the victim's browser, identify the right exploits to launch, obfuscate the exploit code, and send it to the target.
Different exploit toolkits compete with each other on several of features. Obviously, the number and reliability of exploits. But also on user friendliness and look and feel. As evidence of this, check the interface of the Yes exploit toolkit:
No question, they spent some time on that desktop-like, web 2.0 interface...
To leave a comment, complete the form below. Mandatory fields are marked *.