On Fri, 28 Apr 2006 20:47:41 BST, Aaron Gray said: > The only thing that I would add that ehat in an idea world firstly on > finding a vulnerability that an advisory is made to the product producer > then secondly to the list with an IDS fingerprint SNORT. Then not until a > reasonable time to fix the vulnerability the proof of concept exploit is > released (This gives time to hone the exploit as well :) Sometimes (often, in fact) it's really hard to write a good SNORT signature that can't be reverse-engineered to give up enough info to create a PoC....
Attachment:
pgpwdcgwMV58R.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/