Content deleted Content added
Cyberkiborg (talk | contribs) I tried to structure the data more clearly, added sources and data, formalized the lists, and corrected the layout a bit |
ShelfSkewed (talk | contribs) Removed top maintenance template (the lead has been shortened considerably) & adjusted link in other |
||
Line 1:
{{Short description|Method of attack on computer systems}}
An '''exploit''' is a method or piece of code that takes advantage of [[Vulnerability (computer security)|vulnerabilities]] in [[software]], [[Application software|applications]], [[Computer network|networks]], [[operating systems]], or [[Computer hardware|hardware]], typically for malicious purposes.
The term "exploit" derives from the English verb "to exploit," meaning "to use something to one’s own advantage."
Line 71 ⟶ 70:
=== Pivoting ===
{{Off topic|date=August 2024|Pivoting (computer security)|Pivoting is a follow-on to an exploit}}
Pivoting is a technique employed by both hackers and [[penetration test]]ers to expand their access within a target network. By compromising a system, attackers can leverage it as a platform to target other systems that are typically shielded from direct external access by [[Firewall (computing)|firewalls]]. Internal networks often contain a broader range of accessible machines compared to those exposed to the internet. For example, an attacker might compromise a web server on a corporate network and then utilize it to target other systems within the same network. This approach is often referred to as a multi-layered attack. Pivoting is also known as ''island hopping''.
|