Penetration Testing mailing list archives
Re: Re: Different methods of obtaining exploits
From: kish_pent () yahoo com
Date: 6 Feb 2006 05:17:01 -0000
Arguably the title researcher comes to place as pointed out by Neils. He was right, because they dedicate a lot of time for reviewing code and finding new bugs like a format string/stack overflow...and mostly code review is painstaking unlike a pen-test where you're just using tools authored by someone not even yourself. Regards ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Re: Different methods of obtaining exploits Neil (Feb 02)
- <Possible follow-ups>
- Re: Re: Different methods of obtaining exploits kish_pent (Feb 05)