Hi everyone,
 
Sometimes at work I  have to prove that a risk is actually vulnerable (don't 
ask me why I don't have proper training if it's for work, because the massive 
budget cut...). So, I have been searching on internet, and the result has not 
been so great, plus I'm not sure if I should try everything pops out. My 
question is, could someone point me to a correction and safe direction to learn 
exploitations? Thanks.
 
YanYan
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to