Talk:Exploit (computer security): Difference between revisions

Content deleted Content added
m Reverted edit by 212.47.140.107 (talk) to last version by MrOllie
/* Exploit is a common term in the computer security community to refer to a piece of software that is capable to extend privileges on a computer system against intention of the system design. WHAT TAP DID. There are multiple variants of exploits, a common term is 'remote exploit', which refers to an exploit that can take advantage of a security vulnerability remotely, over a network. A 'local exploit' on the other hand can only increase privileges on a system where some kind of local access...
Tags: Reverted Mobile edit Mobile web edit New topic
Line 62:
# Move to [[Pivoting]]
# Fix the disambiguation page [[Pivoting]] too --[[User:Tikmok|Tikmok]] ([[User talk:Tikmok|talk]]) 12:21, 13 August 2024 (UTC)
 
== <b>Exploit</b> is a common term in the [[computer security]] community to refer to a piece of [[software]] that is capable to extend privileges on a computer system against intention of the system design. WHAT TAP DID. There are multiple variants of exploits, a common term is 'remote exploit', which refers to an exploit that can take advantage of a security vulnerability remotely, over a network. A 'local exploit' on the other hand can only increase privileges on a system where some kind of local access is already permitted. Normally a single exploit can only take advantage of a specific software vulnerability. Often, as such an exploit is published, the vulnerability is fixed and the exploit becomes obsolete for newer versions of the software. This is the reason why some blackhat [[hacker|hackers]] do not publish their exploits but keep them private to themselves or other malicious hackers. Such exploits are referred to as 'zeroday exploits' and to obtain access to such exploits is the primary desire of unskilled malicious attackers, so called [[script kiddie|script kiddies]]. ==
 
<b>Exploit</b> is a common term in the [[computer security]] community to refer to a piece of [[software]] that is capable to extend privileges on a computer system against intention of the system design.
WHAT TAP DID.
There are multiple variants of exploits, a common term is 'remote exploit', which refers to an exploit that can take advantage of a security vulnerability remotely, over a network. A 'local exploit' on the other hand can only increase privileges on a system where some kind of local access is already permitted.
Normally a single exploit can only take advantage of a specific software vulnerability. Often, as such an exploit is published, the vulnerability is fixed and the exploit becomes obsolete for newer versions of the software. This is the reason why some blackhat [[hacker|hackers]] do not publish their exploits but keep them private to themselves or other malicious hackers. Such exploits are referred to as 'zeroday exploits' and to obtain access to such exploits is the primary desire of unskilled malicious attackers, so called [[script kiddie|script kiddies]]. [[Special:Contributions/103.143.243.26|103.143.243.26]] ([[User talk:103.143.243.26|talk]]) 07:28, 26 June 2025 (UTC)