Each Vulnerability is triggered in its own way.

Inorder to trigger the vulnerability existing, you need to know how to
use protocol/application and exploit it.

Give a vulnerability, which you found as critical / highest... lets
try to exploit it manually to verify if that vuln exists.

Regards,
0xN41K

On Jul 3, 12:30 am, Old Chick <[email protected]> wrote:
> Hello Friends,
>
> I scanned and ip and got results and generated a report with
> vulnerabilities for that system
> how can i make sure that the vulnerabilities showing the nessus are
> correct and they are there.
> and is there any manual way to find the vulnerabilities in the system.
> if it is the please post.
>
> Thank You
> Old Chic

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to