BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//hack-lu-2024//speaker//EZTTJY
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-VKE3K8@pretalx.com
DTSTART;TZID=CET:20241022T140000
DTEND;TZID=CET:20241022T143000
DESCRIPTION:Website cloaking is a technique that enables websites to delive
 r different content to\ndifferent clients\, with the goal of hiding partic
 ular content from certain clients. Website cloaking is based on client det
 ection\, which is achieved via browser fingerprinting. In an\nattempt to h
 ide their malicious web pages from detection\, cyber criminals (can) use c
 loaking.\nThey use vulnerability detection to only target clients that see
 m vulnerable. On top\nof that\, they (can) also provide benign content in 
 case they suspect someone or something is\ntrying to detect them.\n\nIn th
 is work\, we investigated to what extent security web crawlers can be dete
 cted\nby browser fingerprinting techniques\, and provided some suggestions
  for how to improve them\nto be able to bypass those techniques. We survey
 ed security analysts and analyzed a set of\nthreat intelligence sharing co
 mmunities\, to gauge awareness of cloaking as an available\ndetection evas
 ion method for cybercriminals. Finally\, we investigated one final techniq
 ue\,\nthe use of Cache-Control: no-store\, which an attacker can use to th
 wart\nforensic analysis.
DTSTAMP:20260309T215253Z
LOCATION:Europe - Main Room
SUMMARY:Nothing to see here! On the awareness of and preparedness and defen
 ses against cloaking malicious web content delivery - Jeroen Pinoy
URL:https://pretalx.com/hack-lu-2024/talk/VKE3K8/
END:VEVENT
END:VCALENDAR
