booya
git-svn-id: file:///home/svn/incoming/trunk@2464 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
13e855919a
commit
aeba21280d
|
@ -59,7 +59,7 @@ Presentation Information
|
|||
|
||||
Name of Presentation:
|
||||
|
||||
- Are you in yet?
|
||||
- Are we in yet?
|
||||
|
||||
Select the track(s) that your talk would be most appropriate for your topic (you
|
||||
must select at least one of the nine):
|
||||
|
@ -532,12 +532,12 @@ native command interpreter.
|
|||
The design of Metasploit 2 was heavily focused on the exploit development
|
||||
process. It concentrated on helping to create reliable and robust exploits.
|
||||
While this was, and still is, very important, it's the first step to something
|
||||
more important, what do you now? The presentation will concentrate on our new
|
||||
approach towards Metasploit 3, our next generation of the tool. While 3.0 is
|
||||
far from being released, our new ideas and developments aren't. We will discuss
|
||||
the tools we've created to be the backbone of Metasploit 3.0 insofar as how they
|
||||
work, how you can use them in your own tools, and how they will change the
|
||||
hacking tools of the future.
|
||||
more important: what do you do now? The presentation will concentrate on our
|
||||
new approach towards Metasploit 3, our next generation of the tool. While 3.0
|
||||
is far from being released, our new ideas and developments aren't. We will
|
||||
discuss the tools we've created to be the backbone of Metasploit 3.0 insofar as
|
||||
how they work, how you can use them in your own tools, and how they will change
|
||||
the hacking tools of the future.
|
||||
|
||||
|
||||
Blog Entry:
|
||||
|
|
Loading…
Reference in New Issue