Exploit kit
This article needs additional citations for verification. (October 2020) |
An exploit kit is simply a collection of exploits, which is a simple one-in-all tool for managing a variety of exploits altogether. Exploit kits act as a kind of repository, and make it easy for users without much technical knowledge to usse them simultaneously apart from the pre-installed ones.
Details
One of the earlier kits was MPack, in 2006.Cite error: A <ref>
tag is missing the closing </ref>
(see the help page).[citation needed] Kits continue to include exploitation of vulnerabilities that were long patched, as there continues to be a significant population of unpat
Exploit kits tend to be deployed covertly on legitimate Web sites that have been hacked, unknown to the site operators and visitors.
Exploit kits that have been named include Angler,[1][2] MPack, Phoenix, Blackhole, Crimepack, RIG, Nuclear, Neutrino, and Magnitude exploit kits.[3]
See also
References
- ^ "Demise of Angler, the world's worst exploit kit, still shrouded in mystery". www.theregister.com. Retrieved 2020-10-27.
- ^ Jérôme Segura (15 March 2016). "Large Angler Malvertising Campaign Hits Top Publishers". malwarebytes. Retrieved 16 March 2016.
- ^ Cite error: The named reference
mwbarticle
was invoked but never defined (see the help page).