Betr.: WHERE DO YOU KEEP YOUR EXPLOIT ARCHIVE AND DATABASE

From: Philip Wagenaar (p.wagenaar@accon.nl)
Date: Fri Feb 11 2005 - 10:23:07 EST


www.packtetstormsecurity.com

why keep a record of things that are being archived on the web at multiple sites?

Met vriendelijke groet,

(Philip) Wagenaar
Assistent ICT Projecten & Advies

AccoN Accountants & Adviseurs
ICT Projecten & Advies
Postbus 5090
6802 EB Arnhem
The Netherlands

tel. +31 (0)26-3842384
fax. +31 (0)26-3630222
mobile: +31 (0)6-25388935
MSN/E-mail: p.wagenaar@accon.nl
http://www.accon.nl

>>> "Steve A" <steve@logicallysecure.org> 11-02-05 02:52 >>>
Please excuse this pen testing admin type question . . . .
 
We are looking to undertake a series of penetration tests in areas that
preclude easy access to the internet (you know searching etc on the way
in and limited media movement both in and out).
 
Now, although we keep our proven exploits with us on read only media, I
was wondering how others manage to identify what is exploitable and what
is not especially as you never know what you are going to find.
Basically, I am looking to build a database (hosting software tbd) and
was looking to see how others have tackled the problem of so many
exploits/vulnerabilities being out there and knowing what notices to
include and what to exclude.
 
Thanks
 
Steve A

##################################################################

Dit e-mailbericht is uitsluitend bestemd voor de geadresseerde.
De informatie hierin is vertrouwelijk, zodat het derden niet is
toegestaan om daarvan kennis te nemen of dit te verstrekken aan
andere derden. Indien u dit e-mail bericht ontvangt terwijl het
niet voor u bestemd is, verzoeken wij u contact op te nemen met
de afzender en de informatie te verwijderen van iedere computer.
Bij voorbaat dank.

==================================================================

The information transmitted in this e-mail is intended only for
the person or entity to which it is addressed and contains
confidential information. Any review, retransmission or other
use by persons or entities other than the intended recipient is
prohibited. If you received this in error, please contact the
sender and delete the material from any computer. Thank you.

##################################################################

#####################################################################################
This e-mail message has been scanned for Viruses and Content and cleared
by MailMarshal
#####################################################################################



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:16 EDT