[Dailydave] More SWARM video fun

Dave Aitel dave at immunityinc.com
Mon Aug 6 12:44:25 EDT 2012


When building a large-scale exploitation engine, there's a few major
optimization dials to twiddle. For example, one is "how much state to
store, and where to store it". If you push that dial all the way to "as
little as possible" then you end up with Shodan, which is extremely cost
efficient at large scale scanning for open ports, but finds doing telnet
so expensive they charge extra for it.

But SWARM is not a scanner in that way.  SWARM is optimized for
exploitation and turning the cycle from "having an exploit->doing
something with that exploit" into as fast a cycle as possible. Faster,
ideally, than any coordinated ability to either block such activity (in
the case of offensive use) or take advantage of a vulnerability (in the
case of defensive use).

http://www.immunityinc.com/downloads/swarm-exploitation.mov

-dave



-- 
INFILTRATE - the world's best offensive information security conference.
April 2013 in Miami Beach
www.infiltratecon.com


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 267 bytes
Desc: OpenPGP digital signature
URL: <https://lists.immunityinc.com/pipermail/dailydave/attachments/20120806/d52ae0be/attachment.sig>


More information about the Dailydave mailing list