HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Vulnerabilities: from discovery to exploitation
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Vulnerabilities: from discovery to exploitation  
> Access to the content HTML Beginning of the presentation
PDF PDF version [100 KB]  
> Description Vulnerabilities life cycle description: from discovery to exploitation  
> Context & Dates Talk presented during Networld+Interop 2004, on 4 November 2004.
 
> Author Jean-Baptiste Marchand 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Plan
Vulnérabilités : introduction
Qui trouve des vulnérabilités ?
Comment sont trouvées les vulnérabilités ?
Que se passe t-il lorsqu'une vulnérabilité est découverte ?
Lorsqu'une vulnérabilité est corrigée par un éditeur
Ce qui peut aussi arriver lorsqu'une vulnérabilité est découverte
Où sont publiées et référencées les vulnérabilités ?
Ce qui arrive après la publication d'une vulnérabilité
Ce que peut devenir un exploit
Tendances des vulnérabilités du moment
Quelles solutions face aux vulnérabilités ?
Références  
> Related documents
themeAdvisories
[Service]  Security monitoring
[Article]  Patch 0 Day ! [26 February 2007 - French]
[Presentation]  Software vulnerabilities: latest trends and possible solutions [23 March 2005 - French]
[Standard]  Security Advisory Format [May 1999 - English]
themeIncidents
[Presentation]  Logging and incident processing [15 May 2008 - French]
[Presentation]  Logs and incident processing [29 March 2007 - French]
[Presentation]  Software vulnerabilities: latest trends and possible solutions [23 March 2005 - French]
[Tip]  Antimap [20 November 2001 - French]
[Tip]  How to react (technicaly) in case of intrusion [21 October 2000 - French]
[Presentation]  Intervention after compromision of a Unix server [11 July 2000 - French]
themeNetWorld + Interop
[Presentation]  Wi-Fi security, from WEP up to 802.11i [4 November 2004 - French]
[Techno-watch]  Networld + Interop 2000 Atlanta [30 September 2000 - French]
themeVirus
[Presentation]  Workstation Security [29 March 2007 - French]
[Presentation]  Threats and vulnerability over networks and PCs [23 March 2005 - French]
[Presentation]  Ethereal, a multi-purpose network analyzer - how to detect viruses and worms with network analysis [4 May 2004 - French]
[Article]  Barrer la route aux virus de téléphones portables [18 November 2002 - French]
[Techno-watch]  NIMDA´s review [5 October 2001 - French]
> Copyright © 2004, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 5 November 2004 at 15:02:51 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants