YOU ARE CLAY YOU ARE

git-svn-id: file:///home/svn/incoming/trunk@2630 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Spoon M 2005-06-12 17:11:18 +00:00
parent 9c3dd9d39b
commit 8b9b698548
1 changed files with 27 additions and 19 deletions

View File

@ -57,34 +57,42 @@
\end{sitemize}
\end{sitemize}
\end{frame}
\begin{frame}[t]
\frametitle{What will we discuss?}
\frametitle{What's this presentation about?}
\begin{sitemize}
\item Payload stagers
\item What it's not about
\begin{sitemize}
\item Windows Ordinal Stagers
\item PassiveX
\item New exploit / attack vectors
\item New exploitation techniques
\item Oday, bugs, etc
\end{sitemize}
\pause
\item Payload stages
\pause
\item What it is about
\begin{sitemize}
\item Library Injection
\item The Meterpreter
\item DispatchNinja
\item Cools stuff to down after owning EIP
\item The techniques to do it
\item Our tools to support it
\end{sitemize}
\pause
\item Post-exploitation suites
\begin{sitemize}
\item Very hot area of research for the Metasploit team
\item Suites built off of advanced payload research
\item Client-side APIs create uniform automation interfaces
\item Primary focus of Metasploit 3.0
\pause
\item Attack plan
\begin{sitemize}
\item Shellcode infrastructure
\begin{sitemize}
\item How it works
\item Recent tools, tricks, and techniques
\end{sitemize}
\item Post-exploitation tools
\begin{sitemize}
\item Introduction, previous tools
\item The technology behind ours tools
\item Applications to evasion and anti-forensics
\item Crazy cool features for the end-user
\begin{sitemize}
\end{sitemize}
\end{sitemize}
\end{frame}
\begin{frame}[t]
\frametitle{Background: the exploitation cycle}