Exploiting vulnerabilities

Exploiting vulnerabilities

HomeDebrickedExploiting vulnerabilities
Exploiting vulnerabilities
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
In many cases, it is very easy to exploit vulnerabilities. Not only is it easy to find publicly available exploits, but there are freely available tools that can be used to both find vulnerable systems, run the exploit, and perform the subsequent actions required to fully compromise a system. This can be a scary awakening for many people, especially if you rely on many open source libraries. Because open source use is so widespread, it means that if a vulnerability exists, many systems will share the same vulnerability. There may be more to gain from trying to exploit that vulnerability if you know the likelihood of finding vulnerable systems is high.

In this part of the course we will look at how vulnerabilities can be exploited and what tools are used to do so.

Dive deeper into the topic in our blog:
Software Supply Chain Attacks, Part 2: Open Source Software – https://debricked.com/blog/software-supply-chain-attacks-part-two/

Debricked | Your partner for open source
https://debricked.com/

Chapter:
0:00 Introduction
0:15 Exploits Conditions
2:15 What is ExploitDB?
3:25 What are exploit kits?
6:04 What is the Metasploit framework?

Debricked is the little traveler with big ambitions to not only become the best software composition analysis tool in the universe, but also to bring SCA 2.0 into the game.

Actionability – Debricked SCA not only shows you what security vulnerabilities you have, the tool also helps you fix them with a simple click or a suggested fix.
Data Quality – The Debricked tool is based on state-of-the-art machine learning algorithms, which means the data quality is absolutely top-notch. This means fewer false positives and minimal false alarms.
Open Source Intelligence – Debricked not only helps you analyze and fix vulnerabilities and ensure license compliance, it also gives you better insight into the health of the open source projects your developers use.

Additional resources:
The Debricked Blog ‣ https://debricked.com/blog/
Open Source Selection ‣ https://debricked.com/select/
Vulnerability database ‣ https://debricked.com/vulnerability-database

Connect with us:
LinkedIn ‣ https://www.linkedin.com/company/debricked/
Twitter ‣ @debrickedab
Instagram ‣ @debricked

#Debricked #OpenSource #OpenSourceSecurity

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.