Known vulnerabilities
Last updated
Was this helpful?
Last updated
Was this helpful?
This step ends the reconnaissance phase. The previous steps were aimed at gaining knowledge about the attack surface
Web server
JavaScript Frameworks
and other technologies
Known vulnerabilities may then be identified depending on these information.
Known vulnerabilities can be found from the following resources
: an online exploit database
is a command-line utility that allows to do offline searches through the exploit-db
, and are online CVE (Common Vulnerabilities and Exposures) searches
When a vulnerability is found, one can research a Proof-Of-Concept (PoC) to try at exploiting the vulnerability. Most public PoCs can be found on .