Exploit (computer Security)
An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
Read more about Exploit (computer Security): Classification
Other related articles:
... such as firewall configurations,which may prohibit direct access to all machines ... For example,an attacker compromises a web server on a corporate network,the attacker can then use the compromised web server to attack other systems on the network ... traffic through that target machine,for example to run a vulnerability scan on the internal network through the compromised machine,effectively giving the attacker full network access as if they ...
Famous quotes containing the word exploit:
“Poets treat their experiences shamelessly: they exploit them.”
—Friedrich Nietzsche (18441900)