Exploit (computer security): Difference between revisions

Content deleted Content added
Classification: clarify how cyber threat intelligence helps protecting against vulnerabilities.
Types: tag clarify
Line 24:
 
===Types===
Exploitations are commonly categorized and named<ref>{{cite web|title=Exploits Database by Offensive Security|url=https://www.exploit-db.com/|website=www.exploit-db.com}}</ref><ref>{{cite web|title=Exploit Database {{!}} Rapid7|url=https://www.rapid7.com/db/modules/|website=www.rapid7.com}}</ref> by the type of vulnerability they exploit {{Clarify | text = (see [[Vulnerability (computing)|vulnerabilities]] for a list)| date = August 2024 | reason = This should link to the section where there is supposed to be a 'list.' Which list this is talking about isn't obvious.}}, whether they are local/remote and the result of running the exploit (e.g. [[Elevation of Privilege (computing)|EoP]], [[Denial of Service (computing)|DoS]], [[Spoofing attack|spoofing]]). One scheme that offers zero day exploits is [[exploit as a service]].<ref name=EAA_1>{{cite web| title=Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities| author=Leyden, J.| url=https://portswigger.net/daily-swig/exploit-as-a-service-cybercriminals-exploring-potential-of-leasing-out-zero-day-vulnerabilities| publisher=PortSwigger Ltd| date=16 November 2021| access-date=18 December 2023}}</ref>
 
==== Zero-click ====