From f10da833548aa0031d03182b98bbd80a2b3a4d99 Mon Sep 17 00:00:00 2001 From: Spoon M Date: Sat, 23 Apr 2005 00:21:18 +0000 Subject: [PATCH] ug git-svn-id: file:///home/svn/incoming/trunk@2459 4d416f70-5f16-0410-b530-b9f4589650da --- dev/bh/submission_form.txt | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/dev/bh/submission_form.txt b/dev/bh/submission_form.txt index 51431eeb77..9369a064e5 100644 --- a/dev/bh/submission_form.txt +++ b/dev/bh/submission_form.txt @@ -513,6 +513,16 @@ syscall proxy: Abstract: +When we wrote Metasploit 2, we were concentrating on the exploit development +process, and how to create better exploits. We've since realized that while +this is very important, it's just the first step of the real task, what do when +your in, and how to do it. Our presentation will concentrate on the research +and design of Metasploit 3.0, and how we will take things much further than +just getting root. While the next version of metasploit is far from complete, +we've done a lot of very interesting work which will be the backbone for the +our next generation of tools. + + When it comes to exploitation, the focus has always seemed to be on the vectors used to gain execution control. While such a focus is obviously warranted and necessary, the actual vectors that are in use today have