Exploit (computer Security)
An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
Read more about Exploit (computer Security): Classification
Other related articles:
... attack other systems on the same network to avoid restrictions such as firewall configurations,which may prohibit direct access to all machines ... For example,an attacker compromises a web server on a corporate network,the attacker can then use the compromised web server to attack other systems on the network ... into the compromised machine to route any network traffic through that target machine,for example to run a vulnerability scan on the internal network through the compromised ...
Famous quotes containing the word exploit:
“Fools make researches and wise men exploit them.”
—H.G. (Herbert George)