Penetration Testing mailing list archives
Betr.: WHERE DO YOU KEEP YOUR EXPLOIT ARCHIVE AND DATABASE
From: "Philip Wagenaar" <p.wagenaar () accon nl>
Date: Fri, 11 Feb 2005 16:23:07 +0100
www.packtetstormsecurity.com why keep a record of things that are being archived on the web at multiple sites? Met vriendelijke groet, (Philip) Wagenaar Assistent ICT Projecten & Advies AccoN Accountants & Adviseurs ICT Projecten & Advies Postbus 5090 6802 EB Arnhem The Netherlands tel. +31 (0)26-3842384 fax. +31 (0)26-3630222 mobile: +31 (0)6-25388935 MSN/E-mail: p.wagenaar () accon nl http://www.accon.nl
"Steve A" <steve () logicallysecure org> 11-02-05 02:52 >>>
Please excuse this pen testing admin type question . . . . We are looking to undertake a series of penetration tests in areas that preclude easy access to the internet (you know searching etc on the way in and limited media movement both in and out). Now, although we keep our proven exploits with us on read only media, I was wondering how others manage to identify what is exploitable and what is not especially as you never know what you are going to find. Basically, I am looking to build a database (hosting software tbd) and was looking to see how others have tackled the problem of so many exploits/vulnerabilities being out there and knowing what notices to include and what to exclude. Thanks Steve A ################################################################## Dit e-mailbericht is uitsluitend bestemd voor de geadresseerde. De informatie hierin is vertrouwelijk, zodat het derden niet is toegestaan om daarvan kennis te nemen of dit te verstrekken aan andere derden. Indien u dit e-mail bericht ontvangt terwijl het niet voor u bestemd is, verzoeken wij u contact op te nemen met de afzender en de informatie te verwijderen van iedere computer. Bij voorbaat dank. ================================================================== The information transmitted in this e-mail is intended only for the person or entity to which it is addressed and contains confidential information. Any review, retransmission or other use by persons or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender and delete the material from any computer. Thank you. ################################################################## ##################################################################################### This e-mail message has been scanned for Viruses and Content and cleared by MailMarshal #####################################################################################
Current thread:
- Betr.: WHERE DO YOU KEEP YOUR EXPLOIT ARCHIVE AND DATABASE Philip Wagenaar (Feb 11)