git-svn-id: file:///home/svn/incoming/trunk@2459 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Spoon M 2005-04-23 00:21:18 +00:00
parent 35db5cad62
commit f10da83354
1 changed files with 10 additions and 0 deletions

View File

@ -513,6 +513,16 @@ syscall proxy:
Abstract:
When we wrote Metasploit 2, we were concentrating on the exploit development
process, and how to create better exploits. We've since realized that while
this is very important, it's just the first step of the real task, what do when
your in, and how to do it. Our presentation will concentrate on the research
and design of Metasploit 3.0, and how we will take things much further than
just getting root. While the next version of metasploit is far from complete,
we've done a lot of very interesting work which will be the backbone for the
our next generation of tools.
When it comes to exploitation, the focus has always seemed to be on the
vectors used to gain execution control. While such a focus is obviously
warranted and necessary, the actual vectors that are in use today have