Channel | Publish Date | Thumbnail & View Count | Download Video |
---|---|---|---|
Publish Date not found | 0 Views |
In this part of the course we will look at how vulnerabilities can be exploited and what tools are used to do so.
Dive deeper into the topic in our blog:
Software Supply Chain Attacks, Part 2: Open Source Software – https://debricked.com/blog/software-supply-chain-attacks-part-two/
Debricked | Your partner for open source
https://debricked.com/
Chapter:
0:00 Introduction
0:15 Exploits Conditions
2:15 What is ExploitDB?
3:25 What are exploit kits?
6:04 What is the Metasploit framework?
Debricked is the little traveler with big ambitions to not only become the best software composition analysis tool in the universe, but also to bring SCA 2.0 into the game.
Actionability – Debricked SCA not only shows you what security vulnerabilities you have, the tool also helps you fix them with a simple click or a suggested fix.
Data Quality – The Debricked tool is based on state-of-the-art machine learning algorithms, which means the data quality is absolutely top-notch. This means fewer false positives and minimal false alarms.
Open Source Intelligence – Debricked not only helps you analyze and fix vulnerabilities and ensure license compliance, it also gives you better insight into the health of the open source projects your developers use.
Additional resources:
The Debricked Blog ‣ https://debricked.com/blog/
Open Source Selection ‣ https://debricked.com/select/
Vulnerability database ‣ https://debricked.com/vulnerability-database
Connect with us:
LinkedIn ‣ https://www.linkedin.com/company/debricked/
Twitter ‣ @debrickedab
Instagram ‣ @debricked
#Debricked #OpenSource #OpenSourceSecurity
Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.