YOU ARE CLAY YOU ARE
git-svn-id: file:///home/svn/incoming/trunk@2630 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
9c3dd9d39b
commit
8b9b698548
|
@ -57,34 +57,42 @@
|
|||
\end{sitemize}
|
||||
\end{sitemize}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}[t]
|
||||
\frametitle{What will we discuss?}
|
||||
|
||||
\frametitle{What's this presentation about?}
|
||||
\begin{sitemize}
|
||||
\item Payload stagers
|
||||
\item What it's not about
|
||||
\begin{sitemize}
|
||||
\item Windows Ordinal Stagers
|
||||
\item PassiveX
|
||||
\item New exploit / attack vectors
|
||||
\item New exploitation techniques
|
||||
\item Oday, bugs, etc
|
||||
\end{sitemize}
|
||||
|
||||
\pause
|
||||
\item Payload stages
|
||||
\pause
|
||||
\item What it is about
|
||||
\begin{sitemize}
|
||||
\item Library Injection
|
||||
\item The Meterpreter
|
||||
\item DispatchNinja
|
||||
\item Cools stuff to down after owning EIP
|
||||
\item The techniques to do it
|
||||
\item Our tools to support it
|
||||
\end{sitemize}
|
||||
|
||||
\pause
|
||||
\item Post-exploitation suites
|
||||
\begin{sitemize}
|
||||
\item Very hot area of research for the Metasploit team
|
||||
\item Suites built off of advanced payload research
|
||||
\item Client-side APIs create uniform automation interfaces
|
||||
\item Primary focus of Metasploit 3.0
|
||||
\pause
|
||||
\item Attack plan
|
||||
\begin{sitemize}
|
||||
\item Shellcode infrastructure
|
||||
\begin{sitemize}
|
||||
\item How it works
|
||||
\item Recent tools, tricks, and techniques
|
||||
\end{sitemize}
|
||||
\item Post-exploitation tools
|
||||
\begin{sitemize}
|
||||
\item Introduction, previous tools
|
||||
\item The technology behind ours tools
|
||||
\item Applications to evasion and anti-forensics
|
||||
\item Crazy cool features for the end-user
|
||||
\begin{sitemize}
|
||||
\end{sitemize}
|
||||
\end{sitemize}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}[t]
|
||||
\frametitle{Background: the exploitation cycle}
|
||||
|
||||
|
|
Loading…
Reference in New Issue