Exploit (computer Security)

Exploit (computer Security)

An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.

Read more about Exploit (computer Security):  Classification

Other related articles:

Exploit (computer Security) - Classification - Pivoting
... same network to avoid restrictions such as firewall configurations,which may prohibit direct access to all machines ... For example,an attacker compromises a web server on a corporate network,the attacker can then use the compromised web server to attack other systems on the network ... machine to route any network traffic through that target machine,for example to run a vulnerability scan on the internal network through the compromised machine,effectively giving the ...

Famous quotes containing the word exploit:

    Fools make researches and wise men exploit them.
    —H.G. (Herbert George)