Difference between revisions of "Exploit (computer security)"

From Wiki @ Karl Jones dot com
Jump to: navigation, search
(See also)
Line 1: Line 1:
An '''exploit''' (from the English verb ''to exploit'', meaning "using something to one’s own advantage") is a piece of [[software]], a chunk of [[Data (computing)|data]], or a [[sequence of commands]] that takes advantage of a [[software bug]] or [[Vulnerability (computer science)|vulnerability]] in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
+
An '''exploit''' (from the English verb ''to exploit'', meaning "using something to one’s own advantage") is a piece of [[software]], a chunk of [[Data (computing)|data]], or a [[sequence of commands]] that takes advantage of a [[software defect ("bug")]] or [[Vulnerability (computer science)|vulnerability]] in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
  
 
== Examples ==
 
== Examples ==
Line 20: Line 20:
  
 
* [https://en.wikipedia.org/wiki/Exploit_(computer_security) Exploit (computer security)] @ Wikipedia
 
* [https://en.wikipedia.org/wiki/Exploit_(computer_security) Exploit (computer security)] @ Wikipedia
 +
 +
[[Category:Computer security]]
 +
[[Category:Computing]]
 +
[[Category:Security]]

Revision as of 04:00, 22 April 2016

An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a software defect ("bug") or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

Examples

Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack.

See also

External links