Results 1 to 2 of 2

Thread: VA tools for DB

  1. #1
    Just burned his ISO
    Join Date
    Aug 2006

    Default VA tools for DB

    someone can "link" me to a VA(Vulnerabilty Assessment) tools for Database ?
    thanks !

  2. #2
    Senior Member
    Join Date
    Apr 2007


    You are being very lazy mystic-d.

    I typed this in google and hit search.....

    vulnerability assessment tools databases

    Vulnerability Assessment Two unique modes of assessment Network-based and Agent-based Security Database Tools Watch - BlueScanner 1.1.1 : Bluetooth ...

    Key features of BlueScanner : - Free Bluetooth vulnerability assessment tool - Database-driven collection of device details including: name, unique address, ... - 27k - Cached - Similar pages - Filter

    Assessing Vulnerability Assessment Tools

    Most vulnerability assessment tools fall into one of a few different categories: host-based, application-layer (database or Web), and password and account ... - Similar pages - Filter

    [PDF] Vulnerability Assessment: The Right Tools to Protect Your Critical ...

    File Format: PDF/Adobe Acrobat - View as HTML
    Vulnerability Assessment tools and following up, or apply the configuration to a similar database. In the past, this type of ... - Similar pages - Filter

    [PDF] LNCS 3222 - A Vulnerability Assessment Tool Based on OVAL in Linux ...

    File Format: PDF/Adobe Acrobat
    A Vulnerability Assessment Tool Based on OVAL in Linux System 657. 3.2 Database Design: Schema. System Data gathered by “System Information Collecting ... - Similar pages - Filter

    CSP Online Magazine - The Evolution of Vulnerability Assessment Tools

    Those that had vulnerability signature databases were tied to a fixed set of ... Predictions for the future of vulnerability assessment tools are varied but ... - 59k - Cached - Similar pages - Filter

    [PDF] National Capital Region

    File Format: PDF/Adobe Acrobat - View as HTML
    information stored in the database. The GUI also enabled the users to browse the PDF. files for vulnerability assessment tools and procedures. ... - Similar pages - Filter

    [PDF] Database Vulnerability Assessment by IPLocks:

    File Format: PDF/Adobe Acrobat - View as HTML
    A Comprehensive Database Vulnerability Assessment Solution ... There is a wide array of vulnerability assessment tools available. ... - Similar pages - Filter

    Thread closed.

    Don't ask questions like this that can be easily Googled ever again. You have been officially warned.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [URL=""][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [URL=""][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [URL=""][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL=""][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts