Exploit (computer Security)

Exploit (computer Security)

An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.

Read more about Exploit (computer Security):  Classification

Other related articles:

Exploit (computer Security) - Classification - Pivoting
... network to avoid restrictions such as firewall configurations,which may prohibit direct access to all machines ... For example,an attacker compromises a web server on a corporate network,the attacker can then use the compromised web server to attack other systems on the network ... machine to route any network traffic through that target machine,for example to run a vulnerability scan on the internal network through the compromised machine,effectively giving the ...

Famous quotes containing the word exploit:

    What I have absolutely no sympathy with is the legislator, the man who seeks, for his own profit, to exploit the weaknesses of those who are unable to help themselves and then to fasten some moral superscription upon it. This I loathe so much that I cannot conceivably explain how much it is.
    Malcolm Lowry (1909–1957)