How do exploit kits enumerate or fingerprint their targets?
My current understanding is that an exploit kit will fingerprint (gather information on) a system, check those details against a database of vulnerabilities and then attempt to use the relevant exploits.
I can see simple way… Continue reading How do exploit kits enumerate or fingerprint their targets?