Difference between revisions of "Exploit (computer security)"

From Wiki @ Karl Jones dot com
Jump to: navigation, search
(See also)
(External links)
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
An '''exploit''' (from the English verb ''to exploit'', meaning "using something to one’s own advantage") is a piece of [[software]], a chunk of [[Data (computing)|data]], or a [[sequence of commands]] that takes advantage of a [[software bug]] or [[Vulnerability (computer science)|vulnerability]] in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
+
An '''exploit''' (from the English verb ''to exploit'', meaning "using something to one’s own advantage") is a piece of [[software]], a chunk of [[Data (computing)|data]], or a [[sequence of commands]] that takes advantage of a [[software defect ("bug")]] or [[Vulnerability (computer science)|vulnerability]] in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
  
 
== Examples ==
 
== Examples ==
Line 7: Line 7:
 
== See also ==
 
== See also ==
  
 +
* [[Credential]]
 
* [[Computer program]]
 
* [[Computer program]]
 
* [[Computer programming]]
 
* [[Computer programming]]
 
* [[Computer security]]
 
* [[Computer security]]
* [[Software bug]]
+
* [[Denial-of-service attack]]
 +
* [[Password]]
 +
* [[Software defect]]
 
* [[Improper input validation]]
 
* [[Improper input validation]]
* [[Vulnerability (computer science)]]
+
* [[Vulnerability (computing)]]
  
 
== External links ==
 
== External links ==
  
 
* [https://en.wikipedia.org/wiki/Exploit_(computer_security) Exploit (computer security)] @ Wikipedia
 
* [https://en.wikipedia.org/wiki/Exploit_(computer_security) Exploit (computer security)] @ Wikipedia
 +
 +
[[Category:Computer science]]
 +
[[Category:Computing]]
 +
[[Category:Security]]

Latest revision as of 05:01, 22 April 2016

An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a software defect ("bug") or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

Examples

Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack.

See also

External links