Exploits Portion
Attack tools
May be many different ones exploiting the same vulnerability, so we keep them separate
We try to debug them as we can
Not a very high priority
Source of tool kept
Point to vulnerability(-ies) involved
Previous slide
Next slide
Back to first slide
View graphic version