Dailydave mailing list archives
More SWARM video fun
From: Dave Aitel <dave () immunityinc com>
Date: Mon, 06 Aug 2012 12:44:25 -0400
When building a large-scale exploitation engine, there's a few major optimization dials to twiddle. For example, one is "how much state to store, and where to store it". If you push that dial all the way to "as little as possible" then you end up with Shodan, which is extremely cost efficient at large scale scanning for open ports, but finds doing telnet so expensive they charge extra for it. But SWARM is not a scanner in that way. SWARM is optimized for exploitation and turning the cycle from "having an exploit->doing something with that exploit" into as fast a cycle as possible. Faster, ideally, than any coordinated ability to either block such activity (in the case of offensive use) or take advantage of a vulnerability (in the case of defensive use). http://www.immunityinc.com/downloads/swarm-exploitation.mov -dave -- INFILTRATE - the world's best offensive information security conference. April 2013 in Miami Beach www.infiltratecon.com
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
Current thread:
- More SWARM video fun Dave Aitel (Aug 06)