Each Vulnerability is triggered in its own way. Inorder to trigger the vulnerability existing, you need to know how to use protocol/application and exploit it.
Give a vulnerability, which you found as critical / highest... lets try to exploit it manually to verify if that vuln exists. Regards, 0xN41K On Jul 3, 12:30 am, Old Chick <[email protected]> wrote: > Hello Friends, > > I scanned and ip and got results and generated a report with > vulnerabilities for that system > how can i make sure that the vulnerabilities showing the nessus are > correct and they are there. > and is there any manual way to find the vulnerabilities in the system. > if it is the please post. > > Thank You > Old Chic -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
