From: H D Moore (sflist@digitaloffense.net)
Date: Thu Aug 19 2004 - 20:06:45 EDT
On Thursday 19 August 2004 02:08, darbean@cetin.net.cn wrote:
> >According to
> >http://www.metasploit.com/bh/metasploit.pdf
> >you captured all, for now.
> According to
> http://www.metasploit.com/confs/core04/core04_metasploit.pdf
> you didn't captured all, for now :)
> It said: "Handful of open source projects" in page 7.
Spoonm and I debated this bullet and core04 and finally removed it for
Black Hat. There are a handful of open-source exploit framework projects,
but none of them have been released yet. A couple of them are
fuzzing/exploit frameworks, another one is a complete pen-test framework
(exploits are just a component), and still others are combinations of
libraries and templates for adapting public code. It depends on your
definition I guess, as far as "network exploitation tools" go, Andy
already summed up the only useful options (FluXaY has exploits, but they
are somewhat outdated).
-HD
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.securityfocus.com/sponsor/InfoSecInstitute_pen-test_040817
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:59 EDT