Re: Re: Different methods of obtaining exploits

From: kish_pent@yahoo.com
Date: Mon Feb 06 2006 - 00:17:01 EST


('binary' encoding is not supported, stored as-is) Arguably the title researcher comes to place as pointed out by Neils. He was right, because they dedicate a lot of time for reviewing code and finding new bugs like a format string/stack overflow...and mostly code review is painstaking unlike a pen-test where you're just using tools authored by someone not even yourself.

Regards

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:27 EDT