Content deleted Content added
→Types: Added content Tags: Reverted Mobile edit Mobile web edit |
Abasteraster (talk | contribs) Reverted good faith edits by Seriousdoge289925ogman (talk) |
||
Line 1:
{{Short description|Compromising a computer system}}
An '''exploit''' (from the English verb ''to exploit'', meaning "to use something to one’s own advantage") is a piece of [[software]], a chunk of [[data]], or a sequence of commands that takes advantage of a [[software bug|bug]] or [[vulnerability (computer science)|vulnerability]] to cause unintended or unanticipated behavior to occur on [[Software|computer software]], hardware, or something electronic (usually computerized).<ref>{{Cite web|title=exploit - Definition|url=https://www.trendmicro.com/vinfo/us/security/definition/exploit|access-date=2021-09-04|website=www.trendmicro.com}}</ref> Such behavior frequently includes gaining control of a computer system, allowing [[privilege escalation]], or a [[denial-of-service attack|denial-of-service (DoS or related DDoS) attack]]. In lay terms, some exploit is akin to a '[[security hacker|hack]]'.
==Classification==
Line 43 ⟶ 41:
Pivoting is usually done by infiltrating a part of a network infrastructure (as an example, a vulnerable printer or thermostat) and using a scanner to find other devices connected to attack them. By attacking a vulnerable piece of networking, an attacker could infect most or all of a network and gain complete control.
==See also==
|