Re: WHERE DO YOU KEEP YOUR EXPLOIT ARCHIVE AND DATABASE

From: K-OTiK Security (Special-Alerts@k-otik.com)
Date: Fri Feb 11 2005 - 19:13:01 EST


('binary' encoding is not supported, stored as-is) In-Reply-To: <001201c50fdc$503c5480$9b00a8c0@homer>

-

exploits database -> http://www.k-otik.com/exploits

Regards
Gilles F

>Please excuse this pen testing admin type question . . . .
>
>We are looking to undertake a series of penetration tests in areas that
>preclude easy access to the internet (you know searching etc on the way
>in and limited media movement both in and out).
>
>Now, although we keep our proven exploits with us on read only media, I
>was wondering how others manage to identify what is exploitable and what
>is not especially as you never know what you are going to find.
>Basically, I am looking to build a database (hosting software tbd) and
>was looking to see how others have tackled the problem of so many
>exploits/vulnerabilities being out there and knowing what notices to
>include and what to exclude.
>
>Thanks
>
>Steve A
>
>



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:16 EDT