Vulnerability and exploit repositories

For many years, a number of vulnerabilities have been reported in the public domain. Some of which were disclosed with the proof-of-concept (PoC) exploit code to prove the feasibility and viability of a vulnerability found in the specific software or application, but many still remain unaddressed. This competitive era of finding the publicly available exploit and vulnerability information makes it easier for penetration testers to quickly search and retrieve the best available exploit that may suit their target system environment. It is also possible to port one type of exploit (Win32 architecture) to another type (Linux architecture) provided that you hold intermediate programming skills and a clear understanding ...

Get BackTrack 4: Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.