Date of Submission: 04/2005 I would like to present this at: USA 2005 Personal Information Primary Speaker Name: spoonm Primary Speaker Title (if applicable): Additional Speaker Name(s), Title(s) and Company(s) (if applicable): skape Speaking on Behalf of: Primary Contact's Email: spoonm@gmail.com Primary Contact's Telephone: Speaker's Email (if different from the primary speaker's email): Speaker's Telephone (if different from the primary speaker's telephone): Has the speaker spoken at a previous Black Hat event? Yes or No Yes Does the speaker have any professional speaking experience? Yes or No Yes If yes, please list the three most recent engagements. - cansecwest 2005 - defcon 2004 - blackhat 2004 Has or will this presentation be seen in any form? If so, explain how this presentation is different from previous versions, and where/when this material has been seen before. No Will or has the speaker(s) be presenting at ANY event 30 days prior to this conference? If yes, please specify which event and on what topic(s). No Presentation Information Name of Presentation: - Exploitation, and Beyond! - Are you in yet? Select the track(s) that your talk would be most appropriate for your topic (you must select at least one of the nine): - Deep Knowledge - 0 Day Attack How much time does your presentation require? 75 minutes, 90 minutes or 20 minutes (turbo track) (please specify) 90 minutes What are the three most important reasons why this is a quality Black Hat talk? Reason 1: There have been many presentations on certain exploitation methods, and development. There hasn't been any presentations really discussing a lot of work on the little details that have really improved the modern exploit usage. Our talk will concentrate less on "this is how you exploit IIS", and more on technologies that are required for any attack, and how to further advance in this arena. We will discuss new ideas and implementations in post-exploitation, IDS evasion, and the future of hacking related technologies. -- these suck, but I sort of want to touch on how we will be different/good -- -- or something like -- Although we continue to publically release much of our work, there is much more involved than just what's released. Blackhat is the perfect venue to discuss our ideas, research, design, and development in a detail. It's really important to be able to discuss the sort of things we've thought very hard about, and present a conclusions that would otherwise be taken for granted. Reason 2: The technology discussed in this presentation impacts a wide number of security related fields including NIDS, HIPS, Anti-Virus, penetration testing and the general exploit development cycle. Reason 3: Many of the audience members can't be fully engaged in the deep world of security research. This is a chance for them to get a "view the trenches", and see what's actually happening on the attacker security front. Where technologies currently stand, and where things are going in the future. Is there a demonstration? Yes or No Yes Are the speaker(s) releasing a new tool? Yes or No Possibly, or will talk about many recent (within a year) releases. Are the speaker(s) releasing a new exploit? Yes or No No Is there audience participation? Yes or No No What are your equipment needs? 1 projector. Will you require more than 2 lcd projectors? Yes or No - if yes, please specify how many No Will you require internet access? Yes or No No Will you require a white board? Yes or No No Will you require any special equipment? Yes or No - if yes, please specify. No