Different methods of obtaining exploits

From: yawgmoth7 (yawgmoth7@gmail.com)
Date: Thu Jan 26 2006 - 20:45:43 EST


I've always wondered about this, I do not know why. But just the
different ways that pen-testers get their exploits/vullnerabilities. I
think it would go something like this:
50% From online security sites
25% Find their own
25% From their friends

Have I left any out? If so, go ahead and add it, this is just about
what I think it would be. This has always interesting me for some
reason.

See ya

--
gurusnetwork.org
Gurus'Network - Are you a guru?
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 
Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:25 EDT