Automated Vs. Manual Vulnerability Research

  • Vulnerability scanner like Nessus or Metasploit can automatize Vulnerability Research
  • Can be Open source or not
VulnerabilityDescription
Security MisconfigurationsDue to developer oversight (exposing server information in messages between the application and an attacker)
Broken Access ControlAccess parts of an application that are not supposed to be
Insecure DeserializationInsecure processing of data that is sent across an application. (Pass malicious code to the application)
InjectionInput malicious data into an application (Due to the failure of not sanitizing)
Remote code executionExecute code on the distant machine

Finding Manual Exploits

Rapid7 : Online, Vulnerability and PoC GitHub : Public, unfiltered / unverified Searchsploit : Offline copy of Exploit-DB