Hi,
I recently came across a pretty explanatory analysis of Blackhole Exploit Kit by Sophos. Sure, the paper is quite old, dating back to March 2012 but nevertheless it serves as a nice start to understand how exploit kits work in general. The paper analyses Blackhole EK version 1.2.2.
Here's link to the paper - http://nakedsecurity.sophos.com/expl...e-exploit-kit/
And here's the table of contents:
- Introduction
- Blackhole exploit kit
- Code obfuscation
- Tracking Blackhole
- Discussion and conclusions
- Appendices
It can be directly downloaded as PDF from -> http://sophosnews.files.wordpress.co...er_mar2012.pdf
Hope this helps.
Regards,
c0dist.