+ All Categories
Home > Technology > Waterhole Attack

Waterhole Attack

Date post: 15-Jul-2015
Category:
Upload: symantec
View: 13,845 times
Download: 5 times
Share this document with a friend
Popular Tags:
1
Transcript
Page 1: Waterhole Attack

Attacker profiles victims and the kind of websites they go to.

Attacker then tests these websites for vulnerabilities.

When the attacker finds a website that he can compromise he then injects the JavaScript or HTML redirecting the victim to a separate site hosting the exploit code for the chosen vulnerability.

The compromised website is now “waiting” to infect the profiled victim with a zero-day exploit, just like a lion waiting at a watering hole.

JavaScript/HTML

<body class="home">

id="header"

ad.js"></script>CSS/layout.css"

<script type="text”

WATERING HOLE ATTACKS1.1.

2.2.

3.3.

4.4.

Site hosting exploit code

Recommended