So here's the presentation as promised.
It may lose a little without an explanation behind it, so if I get a chance, I'll post a "conversation" of sorts explaining everything. You have to remember that this was a review of the original Metasploitation repsentation done by H.D. Moore at CanSecWest... which I was, unfortunately, unable to attend. So most of the kudos for this goes to him... I simply added some basic explanations, the videos and some details on some of the web fuzzers... You can get H.D.'s original presentation here.
Anyways... you can get the presentation here.