Penetration Testing mailing list archives

RE: computer/vulnerability database


From: "Shenk, Jerry A" <jshenk () decommunications com>
Date: Sat, 10 Jan 2009 16:52:54 -0500

I know exactly what you mean...in my last message, I talked about using
MS Access and wondered if I'd get flack about that;)  But, my computer
is a tool...I just what something simple that works.

Would you mind sharing what you have set up?

-----Original Message-----
From: James Bensley [mailto:jwbensley () gmail com]
Sent: Saturday, January 10, 2009 4:25 PM
To: Shenk, Jerry A
Cc: pen-test () securityfocus com
Subject: Re: computer/vulnerability database

I don't like to tell anybody this because I'm slightly ashamed but I
use Microsoft (thats right I said it!) Access Database's because they
are a stand alone database that I can take round on my usb pen, go to
a PC, do a little vulnerability test on it, open the access database
and add the results and then on to the next workstation and it has
built in basic reporting!

2009/1/9 Shenk, Jerry A <jshenk () decommunications com>:
Does anybody have any thoughts about a database for an audit to
contain
current vulnerability issues and subsequent updates?

I imagine that it should have at least two tables - one table for
computers and another table for vulnerabilities.  Obviously, each
computer can have multiple vulnerabilities and it would be nice to be
able to generate a report for each vulnerability.  I also think it
would
be good to have the ability to note when vulnerabilities are resolved
as
an additional note.


**DISCLAIMER
This e-mail message and any files transmitted with it are intended for
the use of the individual or entity to which they are addressed and may
contain information that is privileged, proprietary and confidential. If
you are not the intended recipient, you may not use, copy or disclose to
anyone the message or any information contained in the message. If you
have received this communication in error, please notify the sender and
delete this e-mail message. The contents do not represent the opinion of
D&E except to the extent that it relates to their official business.






--
-----BEGIN GEEK CODE BLOCK-----
  Version: 3.1
GIT/MU/U dpu s: a--> C++>$ U+> L++> B-> P+> E?> W+++>$ N K W++ O M++>$
V-
PS+++ PE++ Y+ PGP t 5 X+ R- tv+ b+> DI D+++ G+ e(+++++) h--(++) r++ z++
------END GEEK CODE BLOCK------

**DISCLAIMER
This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which 
they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the 
intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the 
message. If you have received this communication in error, please notify the sender and delete this e-mail message. The 
contents do not represent the opinion of D&E except to the extent that it relates to their official business.



Current thread: