The purpose? Give back to the pentesting community, help it grow, and to point out that pentesting isnt about 0-days at all.
This ppt goes through some advanced tips on:
1. Social networking and using it to make password lists
2. Pivoting via netcat and other advanced netcat foo
3. A comparison of john and rainbow tables attacks, how they work, and why we should do both
4. Pass the hash attacks
Check it out at the InGuardians site:
http://www.inguardians.com/research/doc ... ecrets.pdf