The Advanced Tools section allows users to discover potential vulnerabilities with a series of Software Explorers.
Rajshekhar Murthy discovered following vulnerabilities in major telecom products:
Under budget and time constraints, fuzzing is a common technique to discover vulnerabilities.
This information can be analyzed for known or recently discovered vulnerabilities that can be exploited to gain access to secure networks and computers.
And we really, in doing that, part of it was the research aspect of eEye discovering vulnerabilities, you know, which I could definitely expand on.
The goal of AxMan is to discover vulnerabilities in COM objects exposed through Internet Explorer.
"It discovers vulnerabilities for which we have no solutions."
The mission of the squadron is to attack American military networks, to discover vulnerabilities before a real enemy does.
The purpose of testing allied aircraft was to discover any strengths or vulnerabilities in their design or performance.
It is not intended to discover vulnerabilities, but version detection may highlight deprecated versions of software / firmware and thus indicate potential vulnerabilities.