Slide 27
Slide 27 text
27
Exploit Technology
Interchangeable Payloads
Exploits adapt to network conditions
Reverse, Bind, Findsock, Exec
“Encrypted” xor command shells
Abstracted “cmd_” payloads
Drop in new payloads as needed
Integrated InlineEgg support