Anyhow, I will explain more about this sample video some time along with why its not always worth relying on one tool
Share experiences or thoughts on hacking tools.
scanner_1 | -----> Machine_2_B_Tested
scanner_1 | -----> Send all data to Sorter
Sorter ---> Parse out exploitable services
Sorter ---> Search CVEDetails.com for specifics (LWP is your friend)
Sorter ---> Search for high CVSS score on the above
Sorter ---> Search exploit-db.org, milw0rm, packetstorm for exploit
Sorter ---> Pass info to fuzzbox
Sorter ---> Tinker with peach, klocwork, beStorm and Paimei
sil wrote:Dynamik you get your ISACA results yet... I feel like I'm watching paint dry @ this point
sil wrote:If you're curious to know which exploit Canvas using to get a foot in the door:
http://www.microsoft.com/technet/securi ... 8-067.mspx
dynamik wrote:I actually was but forgot to ask, thanks. Am I missing something though? Didn't you say the system was fully patched? Why was that exploit able to execute successfully?
Users browsing this forum: No registered users and 1 guest