Examine the evidence of exploitability | Fluid Attacks Help

Examine the evidence of exploitability

The Evidence section on Fluid Attacks' platform provides supporting proof of the existence of a type of vulnerability in your software and, if applicable, is where the hacking team shares how they exploit the security issue in question. To view evidence, follow these steps:
  1. Enter the group where the type of vulnerability was reported.

  2. In Vulnerabilities, click on the type of vulnerability.
  3. Select a newly reported vulnerability on the Fluid Attacks platform

  4. Switch to the Evidence tab.
  5. View evidence of a type of vulnerability on the Fluid Attacks platform
    Advice on evidenceClick on a resource to enlarge it, and then you can download it.
Evidence is presented in the form of pictures (with the .png and .jpg extensions) and videos (with the .webm extension), to convince you of the vulnerability's presence in your system and, if applicable, actual threat to information in it.

These are important points to consider regarding evidence:
  1. The evidence presented may change whenever a reattack is performed to check the presence of a vulnerability of the type in question after a fix is implemented.
  2. The number of evidence items is limited to seven.
  3. The items presented can be updated following your request in the Consulting section.
Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.