Hi, everyone! As so many highlights have been given on Intrusion Detection System and Intrusion Prevention System evasions (?) last week, I decided to send this message just to let you all know that I published a brand-new sample video, demonstrating two Exploit Next GenerationR example modules, successfully evading: . SNORT 2.8.6 detection for MS02-056 vulnerability. . SURICATA 0.9.0 detection for MS08-078 vulnerability. Here is the YouTube video: . http://www.youtube.com/watch?v=iHgtf4PXqeU PS: So, Intrusion Detection System and Intrusion Prevention System evasions are not that BIG NEWS, at least not for the H2HC Sixth Edition's audience. Before someone asks what the similarities and/or differences between Exploit Next GenerationR (ENG++) and Advanced Evasion Techniques (AET), let me get this clear: . ENG++ has a different approach and has no similarity to AET, despite the fact that both of them can be used to bypass IDS and IPS technology. Besides, ENG++ is a much older research. . ENG++ was first designed in 2004, coded in 2005, published in 2008 ("Exploit creation - The random approach" or "Playing with random to build exploits"), and became a methodology in 2009 ("The Departed: Exploit Next Generation - The Philosophy"). . ENG++ became a methodology when I decided to port it to work with/to any open exploit development framework, i.e., Metasploit Framework. . Ported means that ENG++ has been developed for a long, long, long time, so just some modules is working on Metasploit Framework to release some of its example and to help people understanding that really cool stuff can be done when you are innovating and creating. In a few words: Exploit Next GenerationR Compliance Methodology is not the same thing as Advanced Evasion Techniques (ENG++ != AET). For further information, please, visit the URL: . http://j.mp/ExploitNG For online information and news about Exploit Next GenerationR Compliance Methodology, please, follow @Exploit_NG on Twitter. Cheers. Nelson Brito Security Researcher http://fnstenv.blogspot.com/