O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Vulnerability and exploit repositories

For many years, a number of vulnerabilities have been reported in the public domain. Some of which were disclosed with the proof-of-concept (PoC) exploit code to prove the feasibility and viability of a vulnerability found in the specific software or application, but many still remain unaddressed. This competitive era of finding the publicly available exploit and vulnerability information makes it easier for penetration testers to quickly search and retrieve the best available exploit that may suit their target system environment. It is also possible to port one type of exploit (Win32 architecture) to another type (Linux architecture) provided that you hold intermediate programming skills and a clear understanding ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required