Re: Cross testing exploit with vulnerability scan results

From: Jan Heisterkamp (janheisterkamp@web.de)
Date: Sat Jul 28 2007 - 17:00:54 EDT


Morning Wood schrieb:
>> I've been conducting pen tests since 4 yrs now... the methodology I
>> follow is that we exploit or attempt to exploit ONLY those
>> vulnerabilities that a vulnerability scanner identifies.
>
> your not a pentester... your a vulnerability scanner kiddi...
> nothing more, nothing less.
>
> Nearly 100% of my successfull pentest were
> from flaws not uncovered by a vuln scan, found
> by manual techniques.
>
> cheers!
> m.w
>
I agree fully with you....
cheers
Jan

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:59 EDT