By Rob Fuller
http://www.metasploit.com/
Failing is learning. Pen-Testers prove fail.
HOCUS POCUS


MS08_067_NETAPI – AKA OL' FAITHFUL



BUILDING A BINARY (IEXPRESS FTW)



PASS THE HASH / TOKEN STEALING


The Framework can be used to:



Testing & Fuzzing during Exploit Development
Make tool development FAST! and EASY!







(shoosh you college people!)

Scripting Tasks (Resource Files / Meterperter Scripts)
Not just sofware! (Wireless, Web, VOIP, etc)
REX!
AND MUCH MORE!


196 AUXILIARY MODULES!







MS 08_067 - http://bit.ly/1o4Ul3
PASS THE HASH - http://bit.ly/3fMlM5
TOKEN STEALING - http://bit.ly/LROoe
USE THE SVN!! - http://bit.ly/4iXe0e
GET INVOLVED! Mailing List, IRC etc:
LEARN MORE


Metasploit Unleashed: http://bit.ly/1VlKLm





Rob Fuller – mubix [at] hak5 [dot] org
http://www.room362.com/
http://twitter.com/mubix
.. anything /mubix

RIT 2009 Intellectual Pwnership

  • 1.
  • 5.
  • 6.
    Failing is learning.Pen-Testers prove fail.
  • 9.
    HOCUS POCUS  MS08_067_NETAPI –AKA OL' FAITHFUL  BUILDING A BINARY (IEXPRESS FTW)  PASS THE HASH / TOKEN STEALING
  • 10.
     The Framework canbe used to:   Testing & Fuzzing during Exploit Development Make tool development FAST! and EASY!      (shoosh you college people!) Scripting Tasks (Resource Files / Meterperter Scripts) Not just sofware! (Wireless, Web, VOIP, etc) REX! AND MUCH MORE!  196 AUXILIARY MODULES!
  • 11.
          MS 08_067 -http://bit.ly/1o4Ul3 PASS THE HASH - http://bit.ly/3fMlM5 TOKEN STEALING - http://bit.ly/LROoe USE THE SVN!! - http://bit.ly/4iXe0e GET INVOLVED! Mailing List, IRC etc: LEARN MORE  Metasploit Unleashed: http://bit.ly/1VlKLm
  • 12.
        Rob Fuller –mubix [at] hak5 [dot] org http://www.room362.com/ http://twitter.com/mubix .. anything /mubix