1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00
metasploit-framework/dev/bh/submission_form.txt
Matt Miller 5deda9d291 edit n shit
git-svn-id: file:///home/svn/incoming/trunk@2447 4d416f70-5f16-0410-b530-b9f4589650da
2005-04-22 18:43:08 +00:00

149 lines
3.7 KiB
Plaintext

Date of Submission:
04/2005
I would like to present this at:
USA 2005
Personal Information
Primary Speaker Name:
spoonm
Primary Speaker Title (if applicable):
Additional Speaker Name(s), Title(s) and Company(s) (if applicable):
skape
Speaking on Behalf of:
Primary Contact's Email:
spoonm@gmail.com
Primary Contact's Telephone:
Speaker's Email (if different from the primary speaker's email):
Speaker's Telephone (if different from the primary speaker's telephone):
Has the speaker spoken at a previous Black Hat event? Yes or No
Yes
Does the speaker have any professional speaking experience? Yes or No
Yes
If yes, please list the three most recent engagements.
- cansecwest 2005
- defcon 2004
- blackhat 2004
Has or will this presentation be seen in any form? If so, explain how this
presentation is different from previous versions, and where/when this material
has been seen before.
No
Will or has the speaker(s) be presenting at ANY event 30 days prior to this
conference? If yes, please specify which event and on what topic(s).
No
Presentation Information
Name of Presentation:
- Exploitation, and Beyond!
- Are you in yet?
Select the track(s) that your talk would be most appropriate for your topic (you
must select at least one of the nine):
- Deep Knowledge
- 0 Day Attack
How much time does your presentation require? 75 minutes, 90 minutes or 20
minutes (turbo track) (please specify)
90 minutes
What are the three most important reasons why this is a quality Black Hat talk?
Reason 1:
There have been many presentations on certain exploitation methods, and
development. There hasn't been any presentations really discussing a lot of
work on the little details that have really improved the modern exploit usage.
Our talk will concentrate less on "this is how you exploit IIS", and more on
technologies that are required for any attack, and how to further advance in
this arena. We will discuss new ideas and implementations in post-exploitation,
IDS evasion, and the future of hacking related technologies.
-- these suck, but I sort of want to touch on how we will be different/good --
-- or something like --
Although we continue to publically release much of our work, there is much
more involved under the hood than just what's released. Blackhat is the
perfect venue to discuss our ideas, research, design, and development in a
detail. It's really important to be able to discuss the sort of things we've
thought very hard about and to present the conclusions that would otherwise
be taken for granted.
Reason 2:
The technology discussed in this presentation impacts a wide number of
security related fields including NIDS, HIPS, Anti-Virus, penetration
testing, and the exploit development cycle in general.
Reason 3:
Many of the audience members can't be fully engaged in the deep world of
security research. This is a chance for them to get a "view from the
trenches", and see what's actually happening on the attacker security front.
Audience members will get an idea of where technologies currently stand, how
they work, and what might be in store for the future.
Is there a demonstration? Yes or No
Yes
Are the speaker(s) releasing a new tool? Yes or No
Possibly, or will talk about many recent (within a year) releases.
Are the speaker(s) releasing a new exploit? Yes or No
No
Is there audience participation? Yes or No
No
What are your equipment needs?
1 projector.
Will you require more than 2 lcd projectors? Yes or No - if yes, please specify
how many
No
Will you require internet access? Yes or No
No
Will you require a white board? Yes or No
No
Will you require any special equipment? Yes or No - if yes, please specify.
No