Exploit (computer security): Difference between revisions

Content deleted Content added
Types: Added content
Tags: Reverted Mobile edit Mobile web edit
Line 1:
{{Short description|Compromising a computer system}}
An '''exploit''' (from the English verb ''to exploit'', meaning "to use something to one’s own advantage") is a piece of [[software]], a chunk of [[data]], or a sequence of commands that takes advantage of a [[software bug|bug]] or [[vulnerability (computer science)|vulnerability]] to cause unintended or unanticipated behavior to occur on [[Software|computer software]], hardware, or something electronic (usually computerized).<ref>{{Cite web|title=exploit - Definition|url=https://www.trendmicro.com/vinfo/us/security/definition/exploit|access-date=2021-09-04|website=www.trendmicro.com}}</ref> Such behavior frequently includes gaining control of a computer system, allowing [[privilege escalation]], or a [[denial-of-service attack|denial-of-service (DoS or related DDoS) attack]]. In lay terms, some exploit is akin to a '[[security hacker|hack]]'.
 
In simple terms, An exploit, commonly known as a [[cheat|cheat]] usually refers to a third party program used to alter the client to get an unfair advantage to other players. Exploits are used in [[greifer|griefing]] and is sometimes used,for example [[Roblox|Roblox]], to steal places, models and assets from other games.Some exploits are in the former of programs or DLL Injection. In the majority of games,Exploiting is against the games rules and is sometimes ban able.Many games use various software to counter exploits. Exploiting is also referred in the gaming community as hacking and/or cheating
 
==Classification==
Line 43 ⟶ 41:
 
Pivoting is usually done by infiltrating a part of a network infrastructure (as an example, a vulnerable printer or thermostat) and using a scanner to find other devices connected to attack them. By attacking a vulnerable piece of networking, an attacker could infect most or all of a network and gain complete control.
 
===Bytecode Through Loadstring Function===
When Lua runs programs, the Lua virtual machine compiles code to Lua bytecode before it is interpreted. This process is irreversible without artifacts (via decompilation) and thus was frequently used for Code Obfuscation in order to manipulate the games memory,mostly in Roblox for example.
 
==See also==