1 00:00:00,420 --> 00:00:03,270 ‫So let's talk some about exploit databases. 2 00:00:04,380 --> 00:00:11,070 ‫The exploit database is the ultimate archive of public exploits and corresponding vulnerable software 3 00:00:11,070 --> 00:00:15,660 ‫developed for use by penetration testers and vulnerability researchers. 4 00:00:15,870 --> 00:00:22,560 ‫Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, 5 00:00:22,560 --> 00:00:29,430 ‫mailing lists and other public resources, and present them in a freely available and easy to navigate 6 00:00:29,430 --> 00:00:30,240 ‫database. 7 00:00:30,720 --> 00:00:38,550 ‫An exploit database is a repository for exploits and proof of concept rather than advisories, making 8 00:00:38,550 --> 00:00:42,540 ‫it a valuable resource for those who need actionable data right away. 9 00:00:43,670 --> 00:00:48,050 ‫The most famous exploit database is exploit DV dot com. 10 00:00:48,680 --> 00:00:55,910 ‫It's a CVC compatible database and wherever its applicable CV numbers are assigned to the individual 11 00:00:55,910 --> 00:00:58,010 ‫exploit entries in the database. 12 00:00:59,360 --> 00:01:01,670 ‫OC So I said CVE compatible. 13 00:01:01,670 --> 00:01:04,220 ‫But what the hack is CVE. 14 00:01:05,480 --> 00:01:09,530 ‫The abbreviation of the Common Vulnerabilities and exposures. 15 00:01:09,650 --> 00:01:17,840 ‫CV is a list of information, security vulnerabilities and exposures that aims to provide common names 16 00:01:17,840 --> 00:01:19,700 ‫for publicly known problems. 17 00:01:19,970 --> 00:01:25,880 ‫The goal of CVE is to make it easier to share data across separate vulnerability capabilities, like 18 00:01:25,880 --> 00:01:30,620 ‫the tools and the repositories and services with this common enumeration. 19 00:01:30,950 --> 00:01:32,480 ‫See, we're all working together. 20 00:01:33,800 --> 00:01:40,640 ‫Now another example of exploit databases is packet storm, and packet storm provides around the clock 21 00:01:40,640 --> 00:01:47,390 ‫information and tools in order to help migrate both personal data and fiscal loss on a global scale. 22 00:01:48,020 --> 00:01:54,020 ‫As new information surfaces, packet storm releases everything immediately through its source feeds 23 00:01:54,020 --> 00:01:55,520 ‫Twitter and Facebook.