Following the Trail of Web-based Malware

This article illustrates a typical threat scenario from start to finish. The goal is to demonstrate how hackers use a combination of tactics to compromise systems.

Profiling the Use of Javascript in a Driveby Download Attack

In this article I will detail how the javascript works in its attempt to download and install malware on unsuspecting visitors’ machines.