Penetration Testing mailing list archives

Re: Cross testing exploit with vulnerability scan results


From: Jan Heisterkamp <janheisterkamp () web de>
Date: Sat, 28 Jul 2007 15:00:54 -0600

Morning Wood schrieb:
I've been conducting pen tests since 4 yrs now... the methodology I
follow is that we exploit or attempt to exploit ONLY those
vulnerabilities that a vulnerability scanner identifies.

your not a pentester... your a vulnerability scanner kiddi...
nothing more, nothing less.

Nearly 100% of my successfull pentest were
from flaws not uncovered by a vuln scan, found
by manual techniques.

cheers!
m.w

I agree fully with you....
cheers
Jan



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: