I get what you are saying, but you miss what I really said. We are running
advanced security labs and hacking labs with tools that can exploit LDAP,
Windows Systems, SQL and so much more.  Here are some excellent references
in the book "The Web Application Hackers handbook second edition"  or
ldap-exploiter, ldap-brute and many other tools out there.  We actually
write the labs to train security professional on how to exploit, I am just
being gingerly as possible not to give any secret sauce away. Hint my broad
examples. 

In the world of cybersecurity; we don't guard against the 99% we guard
against that 1%.  

Again my apologies for using a broad term.

Thank You



--
Sent from: 
http://apache-guacamole-general-user-mailing-list.2363388.n4.nabble.com/

Reply via email to