Re: Different methods of obtaining exploits

From: Roman Medina-Heigl Hernandez (roman@rs-labs.com)
Date: Mon Jan 30 2006 - 05:54:09 EST


yawgmoth7 wrote:
> I've always wondered about this, I do not know why. But just the
> different ways that pen-testers get their exploits/vullnerabilities. I
> think it would go something like this:
> 50% From online security sites
> 25% Find their own
> 25% From their friends

I suppose "friends" probably means underground. So add:

5% Stolen (hacker been hacked :-))
5% From some honeypot

Ups, that's 110%! ;-)

Cheers,
-Roman

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:25 EDT