[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030302090826.765.qmail@web13310.mail.yahoo.com>
From: rizwanalikhan74 at yahoo.com (Rizwan Ali Khan)
Subject: Penetration Testing or Vulnerability Scanning?
When usually we talk about penetration testing tools, people mosly refer to Vulnerability Scanners like iss, typhon, nessus, cybercop etc.
However penetration testing tools are those who penetrate as well, the above scanners do not do that.
One needs to have a working version of SSH exploit for the SSH vulnerability detected by the vulnerability scanner, so is it necessary for penetration tester to have access to the latest of underground exploit? or could all this be done in an ethical manner too?
please guide I am so confused between two of these methodologies.
---------------------------------
Do you Yahoo!?
Yahoo! Tax Center - forms, calculators, tips, and more
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030302/99f42f92/attachment.html
Powered by blists - more mailing lists