StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Blackhole Exploit Kit - What They Are and How They Work - Case Study Example

Comments (0) Cite this document
Summary
The paper "Blackhole Exploit Kit - What They Are and How They Work"  indicates Blackhole exploit general and unique traits. It has delivered in all the three aspects of exploit kits critical to differentiating between exploit kits including traffic, business model, and evasion of detection…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Blackhole Exploit Kit - What They Are and How They Work
Read Text Preview

Extract of sample "Blackhole Exploit Kit - What They Are and How They Work"

Download file to see previous pages The primary purpose of the Blackhole exploit kit is aimed at delivering a malicious payload or exploits to the computer of a victim. It is most notable for its sophisticated Traffic Direction Script (TDS), which enables attackers to construct or configure rules that enforce custom responses. It can deliver various malware depending on the operating system and geographical location of the victim or depending on the time of day or other criteria that the attacker has identified (Howard, 2012). Often, a user would visit a compromised through a legitimate website that had been outfitted with an external or iframe reference that point to the Blackhole exploit site. Because of this invisible call, malware and exploits would be delivered silently while the user is browsing on a legitimate but compromised website. The victim would not be redirected forcibly as there would be no external sign and the user is likely to remain on the legitimate website and it is likely that he or she would be unaware that malware is loading in the background (International Business, 2012). In order to have a better understanding of this topic, this paper will discuss in more detail what Blackhole exploit kits are and how they work.

In recent times, the Blackhole exploit kit has gained wide adoption and it is one of the most common exploit frameworks that are used for the delivery of web-based malware (Ouchn, 2012). This type of crimeware Web application was developed by a Russian hacker known as HodLum to take advantage of exploits that are unpatched to hack computers through malicious scripts that are planted on legitimate but compromised websites. The first Blackhole exploit kit appeared in the market in August 2010 (Howard, 2012). Since then, there have been newer releases, as well as a free version of the kit. The Blackhole exploit kits are based on MySQL and PHP backend and incorporate support for exploiting the most vulnerable and widely used security flaws with the purpose of providing hackers with the highest successful exploitation probability (Rajaraman, 2011). ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Blackhole Exploit Kit - What They Are and How They Work Case Study Example | Topics and Well Written Essays - 1750 words - 1, n.d.)
Blackhole Exploit Kit - What They Are and How They Work Case Study Example | Topics and Well Written Essays - 1750 words - 1. https://studentshare.org/information-technology/1786157-blackhole-exploit-kit-what-are-they-and-how-do-they-work
(Blackhole Exploit Kit - What They Are and How They Work Case Study Example | Topics and Well Written Essays - 1750 Words - 1)
Blackhole Exploit Kit - What They Are and How They Work Case Study Example | Topics and Well Written Essays - 1750 Words - 1. https://studentshare.org/information-technology/1786157-blackhole-exploit-kit-what-are-they-and-how-do-they-work.
“Blackhole Exploit Kit - What They Are and How They Work Case Study Example | Topics and Well Written Essays - 1750 Words - 1”. https://studentshare.org/information-technology/1786157-blackhole-exploit-kit-what-are-they-and-how-do-they-work.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Blackhole Exploit Kit - What They Are and How They Work

Marketing Research ( Slumber Party Kit )

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... (Assignment) Slumber Party Kit Introduction Recently, slumber parties or sleep over parties have gained great popularity across the United States. Slumber party is a child participatory program commonly held during some special events like birthdays. On such occasions, guests are invited to a friend’s house to stay and celebrate the event night together. Traditional participant activities like talking, eating, playing, and sleeping lately are some of the main features of a slumber party; and sometimes, some pre-scheduled activities like restaurant parties and skating are also conducted prior to slumber parties (Boardman’s...
2 Pages (500 words) Essay

Media Kit: Lululemon Athletica Inc

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... Kit: Lululemon Athletica Inc. Press release Lululemon Athletica Inc. is the company that produces sport clothing for middle and upper class consumers. This company ethically connects yoga and sport life style of the contemporaries. In spite of the high-level competitiveness of Adidas and Nike, Lululemon Inc. has expanded to 80 different countries’ markets. A net income of the company was $7.7 million in 2007. This company appeals for both women and men by unique fabric made from silver, bamboo, soya beams etc. Natural materials are dominant for the company and “being natural” is the style of the company as well. Moreover, the uniqu...
2 Pages (500 words) Assignment

How does Interferon work

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... How Does Interferon Work? HIV/AIDS is already a growing problem in our society today. It has already turned into a pandemic since its discovery in 1980. It weakens the immune system therefore rendering the person weak and susceptible to diseases and infections. Numerous researches and experiments are being undertaken to discover a cure for AIDS. An old drug that was used before now opens new possibilities in the treatment of this pandemic. This drug that resulted from biotechnology is derived from a naturally occurring protein in the body called interferon (Bardi par.1, 2, 4; Kallings, 218; Gallo). This paper aims to present the...
4 Pages (1000 words) Essay

Blackhole Exploit Kit

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... Exploit Kit Introduction The Blackhole exploit kit is defined as the framework designed to deliver exploits through third party or compromised websites (Rajaraman, 2011). Experts in information technology and computer sciences consider it as the web threat that is currently the most prevalent. The primary purpose of the Blackhole exploit kit is aimed at delivering a malicious payload or exploits to the computer of a victim. It is most notable for its sophisticated Traffic Direction Script (TDS), which enables attackers to construct or configure rules that enforce custom responses. It can deliver various malware depending on the ope...
7 Pages (1750 words) Research Paper

Daniel Boone and Kit Carson

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... Boone and Kit Carson Introduction The American history is made of stories of heroes and heroines who fearlessly led to the formation of the great America. Many frontiersmen made it possible for the massive American to be habitable and economically productive even in the face of the threat of dangerous wild animals and brutal hostile natives. A few names can be attached to this glory of the early America. Such two names are the names of Kit Carson and Daniel Boone, both of who were early frontiersmen. Contrary to what most people may think, early American frontiersmen did not all hold the same ideas or attitudes. A comparison of Dan...
8 Pages (2000 words) Essay

Marketing Planning- Kit Kat

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... Marketing Planning- Kit Kat Q1 Marketing planning is the process adopted by firms to analyze the market conditions and planning for successful operation. In the recent epoch, marketing planning is changing in various perspectives. They are trying to reduce costs and widen their distribution to a broad customer base. The managers of the business firms are trying to constantly upgrade their products (Henry, 2008). Considering the selling perspective the companies now try to adopt different aggressive and modern selling strategies; like Surf Excel creating artificial demand in the market. Companies give substantial importance to the...
8 Pages (2000 words) Essay

Promotional Strategies for Kit Kat

...Blackhole Exploit Kit - What They Are and How They Work... Choose a product you believe is improperly advertised, marketed, packaged or priced? 2. What you would do differently? Kit Kat is a confectionery originally produced by Rowntree's of England and now created globally by Nestlé. The iconic red and white foil wrapper of the original bar has been its strength but some unconvincing extensions have truly defaced the original brand (Gelder & Woodcock 2003). Currently the brand’s packaging is extremely simple and monotonous. It has been there since years and now needs a fresher look to make it scream on the shelf and get clicked in the consumer’s eyes. In today’s critical economic times, people turn to what they know and tru...
1 Pages (250 words) Assignment

Media kit

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... the contemporary times, technology has greatly facilitated communication. Internet and social media have emerged as major platforms of social hubsthat transcend class, age, gender and geographical boundary. Indeed, the synergistic mix of promotional channels is effective and efficient way of reaching across wider set of people. Virtual communities have gained tremendous success through social media like Facebook, twitter, YouTube etc. (Albert, Flournoy & LeBrasseur, 2009). Through the use of social media, the fragmented Maltese communities in Australia could get a new lease of life to rejuvenate and maintain its fast losing...
2 Pages (500 words) Assignment

Media Kit

...Blackhole Exploit Kit - What They Are and How They Work... Marketing 23 October Shoppers Guide New York one of the favorite tourist destinations for Brazilians and they spend a whopping $1.9 according to NYC and company. On Brazilian day over one million Brazilians flock Manhattan streets celebrating the Brazilian culture. In fact 46 Street is also known as the little Brazil. New York is home of fashion and the best shopping place on earth. The Outlet Collection Jersey Gardens Shopper’s Guide we offer the best and wide spectrum of men and women collection wear in a reasonable price and with excellent services. Our shop offers elegant brands like Gucci, Hugo, Prada, Luis Vittion, Channel and many more. We are surrounded by the best restaurant...
1 Pages (250 words) Essay

Media kit project

...Blackhole Exploit Kit - What They Are and How They Work... Blackhole Exploit Kit - What They Are and How They Work... Kit Project al Affiliation) News release Currier Museum of Art is located in Manchester USA where there is featuring of paintings, decorative arts, sculpture and photographs. There are permanent collections in the museum making the place to be attractive for visits by tourists (Karnes & Shapiro, 2010). The features include Calder, Frank Lloyd Wright, Andrew Wyeth, Picasso, Matisse and Monet. The museum is suitable for tours, family days and live classic music. The main focus of the news release is to bring out the issues that are associated to Currier Museum of Art. The new release also brings about the innovations that have been ...
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Blackhole Exploit Kit - What They Are and How They Work for FREE!

Contact Us