Professional Documents
Culture Documents
l.c
1@
gm
ai
br
y6
89
om
89
1@
gm
ai
l.c
br
y6
om
br
y6
89
1@
gm
ai
l.c
om
br
y6
89
1@
gm
ai
l.c
om
ai
l.c
br
y6
89
1@
gm
om
gm
ai
l.c
y6
89
1@
br
y6
l.c
ai
gm
1@
89
Reconnaissance
Scanning
Exploitation
Reporting
br
om
om
br
y6
89
1@
gm
ai
l.c
om
br
y6
89
1@
gm
ai
l.c
l.c
om
1@
gm
ai
br
y6
89
om
1@
gm
ai
l.c
br
y6
89
Exploits Types :
Remote Exploit
Local Exploit
Dos Exploit
l.c
ai
Vulnerabilities types :
Network Service Vulnerabilities
Web Application Vulnerabilities
Mobile Application Vulnerabilities
Local Service Vulnerabilities
System Vulnerabilities
Human Vulnerabilities
Physical Vulnerabilities
br
y6
89
1@
gm
om
om
br
y6
89
1@
gm
ai
l.c
http://www.exploit-db.com
http://www.securityfocus.com
http://packetstormsecurity.org
y6
l.c
ai
gm
1@
89
us-cert.gov
cve.mitre.org
secunia.com
vupen.com
br
om
y6
89
l.c
ai
gm
1@
Metasploit pro
NeXpose
SAINT
IBM Rational Appscan
Immunity canvas
Core impact
Nessus professional feed
HP Web Inspect
Acunetix WVS
And many others .
br
om
om
br
y6
89
1@
gm
ai
l.c
om
ai
l.c
y6
89
1@
gm
br
om
Introduction : References -1
l.c
Vulnerability Types
Top Vulnerabilities
1@
http://secunia.com/resources/reports/
gm
ai
http://nvd.nist.gov/cwe.cfm
89
br
y6
http://www.exploit-db.com/
http://packetstormsecurity.org/
http://securityreason.com/
om
Introduction : References -2
br
y6
89
1@
gm
ai
l.c
om
Introduction : References -3
gm
ai
l.c
http://www.vulnerabilityassessment.co.uk/rep
ort%20template.html
89
1@
br
y6
http://www.mediafire.com/?wl969qbtptzfp13