Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
36
provide the user with access or privileges that they aren’t supposed to have, and when they are
pursued deliberately and maliciously, the user’s actions become an
exploit
.
31
The word
exploit
in cybersecurity can be used as both a noun and as a verb. As a noun, an exploit
is a procedure for abusing a particular vulnerability. As a verb, to exploit a vulnerability is to
perform the procedure that reliably abuses it.
Let’s wrap up this section by exploring attack surfaces and vectors. An
Yüklə
Dostları ilə paylaş: