Exploit Databaser


Efter at have scannet med Nmap, Metasploit eller andre sårbarheds scanner, har man mange informationer om porte og hvilken service der lytter på de enkelte porte, software versioner og måske informationer om hvilke sårbarheder der er opdaget. Ud fra et sikkerheds synspunkt er det vigtigt at vide om der findes exploits der kan udnytte den/de sårbarheder der er blevet opdaget efter scanningen, og ikke mindst hvilken skade de kan gøre.

Jeg vil her give link til nogle databaser, der kan give informationer om nye og gamle exploits. Metasploit har også exploits man kan bruge.




7 thoughts on “Exploit Databaser”

  1. I’m extremely pleased to discover this website. I wanted to thank you for ones time just for this fantastic read!! I absolutely enjoyed every part of it and i also have you bookmarked to see new stuff in your site.

    1. Thanks for the comment, I’m glad you like it. I want to write new articles, but it takes a long time to test and write an article. It is only possible to write in my spare time.

  2. Thanks for the suggestions you have shared here. Something else I would like to express is that laptop or computer memory specifications generally increase along with other advances in the engineering. For instance, if new generations of processor chips are brought to the market, there is certainly usually a similar increase in the size preferences of all computer system memory and hard drive space. This is because software program operated simply by these processor chips will inevitably increase in power to take advantage of the new technology.

Leave a Reply

Your email address will not be published. Website link will be deleted. We are glad you have chosen to leave a comment. Please keep in mind that all comments are moderated ccording to our privacy policy, all links will be deleted. Do NOT use keywords in the name field. Let us have a personal and meaningful conversation.