Cracking of Wireless Networks - Exploitation of A Vulnerability

Exploitation of A Vulnerability

An exploit takes advantage of a bug in an application. This can take effect in the execution of arbitrary commands by inserting them in the execution path of the program. Escalation of privileges, bypass of authentication, or infringement of confidentiality can be the result.

Read more about this topic:  Cracking Of Wireless Networks

Famous quotes containing the words exploitation of and/or exploitation:

    Communism is inequality, but not as property is. Property is exploitation of the weak by the strong. Communism is exploitation of the strong by the weak.
    Pierre-Joseph Proudhon (1809–1865)

    Communism is inequality, but not as property is. Property is exploitation of the weak by the strong. Communism is exploitation of the strong by the weak.
    Pierre-Joseph Proudhon (1809–1865)