This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:2015 02 24-Aurelien-Francillon-Owasp leuven.pdf

From OWASP
Jump to: navigation, search
2015_02_24-Aurelien-Francillon-Owasp_leuven.pdf(file size: 2.17 MB, MIME type: application/pdf)

An analysis of exploitation behaviors on the web and the role of web hosting providers in detecting them. (by prof. Aurélien Francillon, EURECOM)

Compromised websites are often used by attackers to deliver malicious content or to host phishing pages designed to steal private information from their victims. In a first part of the talk I will describe Eurecom's web honeypot, a set of deliberately vulnerable web applications that are regularly compromised by real attackers. In a second part of the talk, I will describe tests we performed on the ability of specialized monitoring services and web hosting providers to detect compromised websites and how they react to user complaints.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current10:33, 25 February 2015 (2.17 MB)LievenDesmet (talk | contribs)An analysis of exploitation behaviors on the web and the role of web hosting providers in detecting them. (by prof. Aurélien Francillon, EURECOM) Compromised websites are often used by attackers to deliver malicious content or to host phishing pages...
  • You cannot overwrite this file.

There are no pages that link to this file.