﻿1
00:00:00,450 --> 00:00:03,090
‫So let's talk some about exploit database's.

2
00:00:04,420 --> 00:00:10,900
‫The exploited database is the ultimate archive of public exploits and corresponding vulnerable software

3
00:00:11,200 --> 00:00:18,310
‫developed for use by penetration testers and vulnerability researchers, its aim is to serve as the

4
00:00:18,310 --> 00:00:24,400
‫most comprehensive collection of exploits gathered through direct submissions, mailing lists and other

5
00:00:24,400 --> 00:00:29,470
‫public resources and present them in a freely available and easy to navigate.

6
00:00:29,470 --> 00:00:37,750
‫Database and exploit database is a repository for exploits and proof of concept rather than advisories,

7
00:00:38,200 --> 00:00:42,370
‫making it a valuable resource for those who need actionable data right away.

8
00:00:43,650 --> 00:00:52,230
‫The most famous exploit database is exploited by dot com, it's a KVI compatible database, and wherever

9
00:00:52,230 --> 00:00:57,800
‫it's applicable, see the ID numbers are assigned to the individual exploit entries in the database.

10
00:00:59,310 --> 00:01:04,110
‫OK, so I said KVI compatible, but what the heck is KVI?

11
00:01:05,490 --> 00:01:13,860
‫The abbreviation of the Common Vulnerabilities and Exposures KVI is a list of information security vulnerabilities

12
00:01:13,860 --> 00:01:19,480
‫and exposures that aims to provide common names for publicly known problems.

13
00:01:20,070 --> 00:01:25,890
‫The goal of KVI is to make it easier to share data across a separate vulnerability capabilities like

14
00:01:25,890 --> 00:01:32,340
‫the tools and the repositories and services with this common enumeration say we're all working together.

15
00:01:33,830 --> 00:01:40,670
‫Now, another example of exploited databases is packett storm and Pacard Storm provides around the clock

16
00:01:40,670 --> 00:01:47,180
‫information and tools in order to help migrate both personal data and fiscal laws on a global scale.

17
00:01:48,080 --> 00:01:54,530
‫As new information surfaces, packet storm releases everything immediately through its RSS feeds, Twitter

18
00:01:54,530 --> 00:01:55,340
‫and Facebook.

