Dr. Chaos Security Blog: www.DrChaos.com
Twitter: https://twitter.com/aamirlakhani
Exploit Kits are tools attackers use to compromise and control systems. They are used to distribute malware such as remote access toolkits (RATs) and Ransomware such as CryptoLocker. They are used by criminals and groups from all over the world.
Join my co-host Anthony Giandomenico (https://www.linkedin.com/in/anthonygiandomenico) as we speak with Joseph Muniz, aka The Security Blogger as we dive into the world of Exploit Kits.
Guest: Joseph Muniz:
The Security Blogger: http://www.thesecurityblogger.com/
Joey's Twitter Feed: https://twitter.com/secureblogger
Exploit Kits 101 - How they work: http://www.thesecurityblogger.com/exploit-kits-101-how-a-typical-exploit-kit-functions/
Books Written by Joseph Muniz:
Security Operations Center: Building, Operating, and Maintaining your SOC
http://www.ciscopress.com/store/security-operations-center-building-operating-and-maintaining-9780134052014
Books written by Joseph Muniz and Aamir Lakhani, Dr. Chaos
Penetration Testing with Raspberry Pi
https://www.packtpub.com/networking-and-servers/penetration-testing-raspberry-pi
Web Penetration Testing with Kali Linux
https://www.packtpub.com/networking-and-servers/penetration-testing-raspberry-pi