git-svn-id: file:///home/svn/incoming/trunk@2464 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Matt Miller 2005-04-23 00:54:22 +00:00
parent 13e855919a
commit aeba21280d
1 changed files with 7 additions and 7 deletions

View File

@ -59,7 +59,7 @@ Presentation Information
Name of Presentation:
- Are you in yet?
- Are we in yet?
Select the track(s) that your talk would be most appropriate for your topic (you
must select at least one of the nine):
@ -532,12 +532,12 @@ native command interpreter.
The design of Metasploit 2 was heavily focused on the exploit development
process. It concentrated on helping to create reliable and robust exploits.
While this was, and still is, very important, it's the first step to something
more important, what do you now? The presentation will concentrate on our new
approach towards Metasploit 3, our next generation of the tool. While 3.0 is
far from being released, our new ideas and developments aren't. We will discuss
the tools we've created to be the backbone of Metasploit 3.0 insofar as how they
work, how you can use them in your own tools, and how they will change the
hacking tools of the future.
more important: what do you do now? The presentation will concentrate on our
new approach towards Metasploit 3, our next generation of the tool. While 3.0
is far from being released, our new ideas and developments aren't. We will
discuss the tools we've created to be the backbone of Metasploit 3.0 insofar as
how they work, how you can use them in your own tools, and how they will change
the hacking tools of the future.
Blog Entry: