YOU ARE CLAY YOU ARE

git-svn-id: file:///home/svn/incoming/trunk@2630 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Spoon M 2005-06-12 17:11:18 +00:00
parent 9c3dd9d39b
commit 8b9b698548
1 changed files with 27 additions and 19 deletions

View File

@ -57,34 +57,42 @@
\end{sitemize} \end{sitemize}
\end{sitemize} \end{sitemize}
\end{frame} \end{frame}
\begin{frame}[t] \begin{frame}[t]
\frametitle{What will we discuss?} \frametitle{What's this presentation about?}
\begin{sitemize} \begin{sitemize}
\item Payload stagers \item What it's not about
\begin{sitemize} \begin{sitemize}
\item Windows Ordinal Stagers \item New exploit / attack vectors
\item PassiveX \item New exploitation techniques
\item Oday, bugs, etc
\end{sitemize} \end{sitemize}
\pause \pause
\item Payload stages \item What it is about
\begin{sitemize} \begin{sitemize}
\item Library Injection \item Cools stuff to down after owning EIP
\item The Meterpreter \item The techniques to do it
\item DispatchNinja \item Our tools to support it
\end{sitemize} \end{sitemize}
\pause \pause
\item Post-exploitation suites \item Attack plan
\begin{sitemize}
\item Shellcode infrastructure
\begin{sitemize}
\item How it works
\item Recent tools, tricks, and techniques
\end{sitemize}
\item Post-exploitation tools
\begin{sitemize}
\item Introduction, previous tools
\item The technology behind ours tools
\item Applications to evasion and anti-forensics
\item Crazy cool features for the end-user
\begin{sitemize} \begin{sitemize}
\item Very hot area of research for the Metasploit team
\item Suites built off of advanced payload research
\item Client-side APIs create uniform automation interfaces
\item Primary focus of Metasploit 3.0
\end{sitemize} \end{sitemize}
\end{sitemize} \end{sitemize}
\end{frame} \end{frame}
\begin{frame}[t] \begin{frame}[t]
\frametitle{Background: the exploitation cycle} \frametitle{Background: the exploitation cycle}