Content deleted Content added
Line 4:
== Basic summary of how Blackhole works ==
# The customer licenses the Blackhole exploit kit from the authors and specifies various options to customize the kit.
# A potential victim loads a compromised web page or opens a malicious link in a
# The compromised web page or malicious link in the spammed email sends the user to a Blackhole exploit kit server's landing page.
# This landing page contains obfuscated [[JavaScript]] that determines what is on the victim's computers and loads all exploits to which this computer is vulnerable and sometimes a [[Java]] [[applet]] tag that loads a Java Trojan horse.
|