Cracking of Wireless Networks - Exploitation of A Vulnerability

Exploitation of A Vulnerability

An exploit takes advantage of a bug in an application. This can take effect in the execution of arbitrary commands by inserting them in the execution path of the program. Escalation of privileges, bypass of authentication, or infringement of confidentiality can be the result.

Read more about this topic:  Cracking Of Wireless Networks

Famous quotes containing the words exploitation of and/or exploitation:

    The only phenomenon with which writing has always been concomitant is the creation of cities and empires, that is the integration of large numbers of individuals into a political system, and their grading into castes or classes.... It seems to have favored the exploitation of human beings rather than their enlightenment.
    Claude Lévi-Strauss (b. 1908)

    Communism is inequality, but not as property is. Property is exploitation of the weak by the strong. Communism is exploitation of the strong by the weak.
    Pierre-Joseph Proudhon (1809–1865)