Re: Different methods of obtaining exploits

From: barcajax@gmail.com
Date: Sat Jan 28 2006 - 22:22:30 EST


('binary' encoding is not supported, stored as-is) You left out one resource. Installing, updating and using Metasploit. The guys who maintain Metasploit regularly update it to include the latest exploits but you could also write your own exploits and add it to the existing library.

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:25 EDT