26 Oct
2000
26 Oct
'00
12:48
Hi all .. I see a great thing in people discovering holes and so on in all sorts of applications .. but how can i check whether the software the victim is running is something that can be exploited. I know my knowledge on this area isn't good but is there more methods than just port scanning and connecting to the open ports ? Thanks in advance Steffen Beck Sign up for your "FREE E-MAIL" @ MADMAIL http://www.madmail.com