March 2004
Intermediate to advanced
396 pages
11h
English
To maintain the security of your environment, it is vital to be aware of the latest threats posed to your network and its components. You should regularly check Internet mailing lists and hacking web sites to access the latest public information about vulnerabilities and exploit scripts. I’ve assembled the following lists of web sites and mailing lists that security consultants and hackers use on a daily basis.
| BugTraq, http://www.securityfocus.com/archive/1 |
| VulnWatch, http://www.vulnwatch.org |
| NTBugTraq, http://www.ntbugtraq.com |
| Full Disclosure, http://lists.netsys.com/pipermail/full-disclosure/ |
| Pen-Test, http://www.securityfocus.com/archive/101 |
| Web Application Security, http://www.securityfocus.com/archive/107 |
| Honeypots, http://www.securityfocus.com/archive/119 |
| CVE Announce, http://archives.neohapsis.com/archives/cve/ |
| Nessus development, http://list.nessus.org/ |
| Nmap-hackers, http://lists.insecure.org/nmap-hackers/ |
| MITRE CVE, http://cve.mitre.org |
| ISS X-Force, http://xforce.iss.net |
| OSVDB, http://www.osvdb.org |
| BugTraq, http://www.securityfocus.com/bid/ |
| CERT vulnerability notes, http://www.kb.cert.org/vuls/ |
| Secunia, http://www.secunia.com |
| The Hacker’s Choice, http://www.thc.org |
| Packet Storm, http://www.packetstormsecurity.org |
| Insecure.org, http://www.insecure.org |
| Zone-H, http://www.zone-h.org |
| Phenoelit, http://www.phenoelit.de |
| newroot.de, http://www.newroot.de |
| Pulhas, http://p.ulh.as/ ... |
Read now
Unlock full access