Hi tanyoo10, > (1) When a vulnerability is unknown, exploit-based might be a good solution.
just in case you didn't realize...if you have the exploit to generate the signature, you already know what the vulnerability is. cheers, sergio
Hi tanyoo10, > (1) When a vulnerability is unknown, exploit-based might be a good solution.
just in case you didn't realize...if you have the exploit to generate the signature, you already know what the vulnerability is. cheers, sergio