Chapter
Clips
In the 2000s, individuals who previously shared their exploits with the community started getting jobs and ceased weaponizing their tools.
09:44 - 11:05 (01:20)
Summary
In the 2000s, individuals who previously shared their exploits with the community started getting jobs and ceased weaponizing their tools. As a result, commercial firms like Core Impact were established as professional penetration testers couldn't risk launching unverified exploits on their clients' network due to ethical concerns.
ChapterEvolution of Metasploit
Episode114: HD
PodcastDarknet Diaries
This podcast discusses the creation of Metasploit, an exploit toolkit that allows users to assemble exploits and payloads like LEGOs, making cyber attacks much simpler.
11:01 - 13:46 (02:44)
Summary
This podcast discusses the creation of Metasploit, an exploit toolkit that allows users to assemble exploits and payloads like LEGOs, making cyber attacks much simpler.
ChapterEvolution of Metasploit
Episode114: HD
PodcastDarknet Diaries
HD Moore discusses the modularization of Metasploit and how it allows users to easily combine different elements like exploits and payloads to create customized attacks.
13:46 - 15:10 (01:24)
Summary
HD Moore discusses the modularization of Metasploit and how it allows users to easily combine different elements like exploits and payloads to create customized attacks.
ChapterEvolution of Metasploit
Episode114: HD
PodcastDarknet Diaries
The hosts discuss the inner workings of a homebrew exploit toolkit and how it can evade detection by antivirus tools.
15:10 - 17:29 (02:19)
Summary
The hosts discuss the inner workings of a homebrew exploit toolkit and how it can evade detection by antivirus tools. They also explore the potential dangers of such a toolkit in the wrong hands.