The document summarizes research analyzing the BlackHole browser exploit pack (BEP), one of the most widely used BEPs. The researchers collected samples of the BlackHole BEP over 3 months and analyzed its source code to understand exploitation techniques. Their analysis found the BlackHole BEP uses an AJAX-based framework to track infected machines and supports custom widgets. It also exploits browser vulnerabilities through techniques like heap spraying and uses obfuscation to avoid detection.