Difference between revisions of "Exploit (computer security)"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) |
Karl Jones (Talk | contribs) (→External links) |
||
(One intermediate revision by the same user not shown) | |||
Line 15: | Line 15: | ||
* [[Software defect]] | * [[Software defect]] | ||
* [[Improper input validation]] | * [[Improper input validation]] | ||
− | * [[Vulnerability ( | + | * [[Vulnerability (computing)]] |
== External links == | == External links == | ||
Line 21: | Line 21: | ||
* [https://en.wikipedia.org/wiki/Exploit_(computer_security) Exploit (computer security)] @ Wikipedia | * [https://en.wikipedia.org/wiki/Exploit_(computer_security) Exploit (computer security)] @ Wikipedia | ||
− | [[Category:Computer | + | [[Category:Computer science]] |
[[Category:Computing]] | [[Category:Computing]] | ||
[[Category:Security]] | [[Category:Security]] |
Latest revision as of 04:01, 22 April 2016
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a software defect ("bug") or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
Examples
Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack.
See also
- Credential
- Computer program
- Computer programming
- Computer security
- Denial-of-service attack
- Password
- Software defect
- Improper input validation
- Vulnerability (computing)
External links
- Exploit (computer security) @ Wikipedia