From: K-OTiK Security (Special-Alerts@k-otik.com)
Date: Fri Feb 11 2005 - 19:13:01 EST
-
exploits database -> http://www.k-otik.com/exploits
Regards
Gilles F
>Please excuse this pen testing admin type question . . . .
>
>We are looking to undertake a series of penetration tests in areas that
>preclude easy access to the internet (you know searching etc on the way
>in and limited media movement both in and out).
>
>Now, although we keep our proven exploits with us on read only media, I
>was wondering how others manage to identify what is exploitable and what
>is not especially as you never know what you are going to find.
>Basically, I am looking to build a database (hosting software tbd) and
>was looking to see how others have tackled the problem of so many
>exploits/vulnerabilities being out there and knowing what notices to
>include and what to exclude.
>
>Thanks
>
>Steve A
>
>
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:16 EDT