Penetration Testing mailing list archives
Exploit Repositories and Due Diligence
From: "Jeff" <jb () jbware net>
Date: Thu, 9 Jun 2005 21:19:52 -0400
I have a question regarding the use of exploit repositories (including projects like Metaploit, and compliations on bootable distros like Whoppix). With all of the large exploit repositories used to make pen testing faster and easier, what methods do you use to ensure you've done your due diligence in not unleashing something actually harmful on your clients? I have my own thoughts, such as googling and superficial|deep code reviews, but ultimately my concern is over the malcious hiding of intentions. Thanks for any insights and suggestions. - Jeff
Current thread:
- RE: SQL injection Todd Towles (Jun 09)
- <Possible follow-ups>
- Re: SQL injection Davi Ottenheimer (Jun 09)
- RE: SQL injection Bénoni MARTIN (Jun 09)
- Re: RE: SQL injection travis . barlow (Jun 09)
- RE: SQL injection Ofer Shezaf (Jun 09)
- RE: SQL injection Hecber Cordova (Jun 09)
- Exploit Repositories and Due Diligence Jeff (Jun 09)
- RE: Exploit Repositories and Due Diligence Leandro Reox (Jun 09)
- RE: Exploit Repositories and Due Diligence Sahir Hidayatullah (Jun 10)
- RE: Exploit Repositories and Due Diligence Carl Tucker (Jun 14)
- RE: Exploit Repositories and Due Diligence Carl Tucker (Jun 20)
- RE: SQL injection Hecber Cordova (Jun 09)
- Re: SQL injection Tim (Jun 09)
- Re: SQL injection James Riden (Jun 09)
- RE: SQL injection Leandro Reox (Jun 09)
- RE: SQL injection Todd Towles (Jun 09)
- RE: SQL injection Leandro Reox (Jun 10)
- Re: SQL injection Hernán M . Racciatti (Jun 10)
- RE: SQL injection Leandro Reox (Jun 10)