mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
ug
git-svn-id: file:///home/svn/incoming/trunk@2459 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
35db5cad62
commit
f10da83354
@ -513,6 +513,16 @@ syscall proxy:
|
|||||||
|
|
||||||
Abstract:
|
Abstract:
|
||||||
|
|
||||||
|
When we wrote Metasploit 2, we were concentrating on the exploit development
|
||||||
|
process, and how to create better exploits. We've since realized that while
|
||||||
|
this is very important, it's just the first step of the real task, what do when
|
||||||
|
your in, and how to do it. Our presentation will concentrate on the research
|
||||||
|
and design of Metasploit 3.0, and how we will take things much further than
|
||||||
|
just getting root. While the next version of metasploit is far from complete,
|
||||||
|
we've done a lot of very interesting work which will be the backbone for the
|
||||||
|
our next generation of tools.
|
||||||
|
|
||||||
|
|
||||||
When it comes to exploitation, the focus has always seemed to be on the
|
When it comes to exploitation, the focus has always seemed to be on the
|
||||||
vectors used to gain execution control. While such a focus is obviously
|
vectors used to gain execution control. While such a focus is obviously
|
||||||
warranted and necessary, the actual vectors that are in use today have
|
warranted and necessary, the actual vectors that are in use today have
|
||||||
|
Loading…
Reference in New Issue
Block a user