Results 1 to 5 of 5

Thread: Vulnerability analysis

  1. #1

    Vulnerability analysis

    i have a question. when searching for vulnerabilitys in systems, such as on the ICAT Vulnerability Database what is the best way to interpit the results.... i somewhat understand it but sometimes is really hard to interpit, what can i study to better increase my knowlege on security????

  2. #2
    Senior Member
    Join Date
    Nov 2003
    Well, it really depends on the OS and the system that you're using to scan it.

    You mentioned ICAT Vulnerability Database, I'd check out, which has a lot of information. The searc there should be pretty good guide, it lets you search for how recent, how high the risk is, what type and many other things, as well as OS customization. A valuable resource.

    Could you be a bit more specific about what it is your trying to do or find out, though? I'm not really sure this answers your question or that I even fully understand it.
    There is a ghost in the machine, and he is my friend.

  3. #3
    what sort of things shall i studey to be abl to successfully exploit and exploit

  4. #4
    Senior Member
    Join Date
    Oct 2002
    rwarren, I would suuggest against asking a question like how do I successfully use an exploit on here, many of us on here are the folks who have to deal with those who try and do this so you are asking for trouble.

    If you want to know how exploits work, well learn all about networking, and programming, and so go buy some books, and read what you can on here and elsewhere on the web
    Quis custodiet ipsos custodes

  5. #5
    well just to say, i amnot going to use this in a bad way. i just hope to use this info to learn more about securiity... i plan to go to ITT-Tech in boise idaho.... but i would like a little head start.... understand

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts