git-svn-id: file:///home/svn/incoming/trunk@2471 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Spoon M 2005-04-23 05:06:40 +00:00
parent 19272f4efc
commit 3fa8228a0e
1 changed files with 3 additions and 3 deletions

View File

@ -70,7 +70,7 @@ must select at least one of the nine):
How much time does your presentation require? 75 minutes, 90 minutes or 20
minutes (turbo track) (please specify)
90 minutes
90 minutes (could do 75 if necessary)
What are the three most important reasons why this is a quality Black Hat talk?
@ -519,7 +519,7 @@ this is obviously very important, it's only the first step in the process. What
do you do once you own EIP? Our presentation will concentrate on the recent
advancements in shellcode, IDS/firewall evasion, and post-exploitation systems.
We will discuss the design and implementation of the technologies that enable
complex paylods, such as VNC injection, and the suite of tools we've built upon
complex payloads, such as VNC injection, and the suite of tools we've built upon
them. We will then present a glimps of the next generation of Metasploit, and
how these new advances will serve as it's backbone.
@ -532,7 +532,7 @@ making them smaller. We're currently working on building very powerful new
post-exploitation shellcode and toolkits, and a very powerful unified API to
expose their functionality. This will allow us to diverge from precanned
payloads, which will in turn allow users to quickly build powerful and portable
post-exploitation tools. We've have built strongly upon our Windows DLL
post-exploitation tools. We have built strongly upon our Windows DLL
injection, and are working on extending similar functionality to the land of
Unix. We're also working hard on the next version of Metasploit, which follows
this same philosophy of embedability and extensablity, allowing users to build