From: Morning Wood (se_cur_ity@hotmail.com)
Date: Sat Jul 28 2007 - 12:34:59 EDT
> I've been conducting pen tests since 4 yrs now... the methodology I
> follow is that we exploit or attempt to exploit ONLY those
> vulnerabilities that a vulnerability scanner identifies.
your not a pentester... your a vulnerability scanner kiddi...
nothing more, nothing less.
Nearly 100% of my successfull pentest were
from flaws not uncovered by a vuln scan, found
by manual techniques.
cheers!
m.w
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:59 EDT