Examine the evidence of exploitability
The
Evidence section on Fluid Attacks' platform provides supporting proof of the existence of a
type of vulnerability in your software and, if applicable, is where the hacking team shares how they exploit the security issue in question. To view evidence, follow these steps:
- Enter the group where the type of vulnerability was reported.
- In Vulnerabilities, click on the type of vulnerability.
- Switch to the Evidence tab.
Click on a resource to enlarge it, and then you can download it.
Evidence is presented in the form of pictures (with the .png and .jpg extensions) and videos (with the .webm extension), to convince you of the vulnerability's presence in your system and, if applicable, actual threat to information in it.
These are important points to consider regarding evidence:
- The evidence presented may change whenever a reattack is performed to check the presence of a vulnerability of the type in question after a fix is implemented.
- The number of evidence items is limited to seven.
- The items presented can be updated following your request in the Consulting section.
Free trial