Appendix B. Sources of Vulnerability Information

To maintain the security of your environment, it is vital to be aware of the latest threats posed to your network and its components. You should regularly check Internet mailing lists and hacking web sites to access the latest public information about vulnerabilities and exploit scripts. I’ve assembled the following lists of web sites and mailing lists that security consultants and hackers use on a daily basis.

Security Mailing Lists

The following mailing lists contain interesting and useful discussion relating to current security vulnerabilities and issues:

BugTraq (
Full Disclosure (
Pen-Test (
Web Application Security (
Honeypots (
CVE Announce (
Nessus development (
Nmap-hackers (
VulnWatch (

Vulnerability Databases and Lists

The following vulnerability databases and lists can be searched to enumerate vulnerabilities in specific technologies and products:

ISS X-Force (
BugTraq (
CERT vulnerability notes (

Underground Web Sites ...

Get Network Security Assessment, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.