Exploit (computer security): Difference between revisions

Content deleted Content added
Fly
Tags: Reverted Visual edit Mobile edit Mobile web edit
m Reverted 1 edit by 2601:447:C783:FFD0:98AB:48DF:DECD:4620 (talk) to last revision by YourLocalZenith
Line 33:
''By Method of Communication:''<ref name=":0">{{Cite web |date=2024-06-18 |title=What Is An Exploit? |url=https://www.ituonline.com/tech-definitions/what-is-an-exploit/ |access-date=2025-03-15 |language=en-US}}</ref>
 
* '''Remote Exploits''': Works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
* '''Local Exploits:''' Requires prior access or physical access to the vulnerable system, and usually increases the privileges of the person running the exploit past those granted by the system administrator.