Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Category:Exploitation"

From NetSec
Jump to: navigation, search
Line 1: Line 1:
* compiled [[binary]] exploitation - buffer overflows, format str vulns, etc
+
Exploitation is taking advantage of a [[vulnerability]] in a foreign system to gain access or absolute control over the foreign [[host]].
* interpreted language exploitation - cmd injection, etc
+
* network exploitation - dns poisoning, icmp redirect, arp poisoning, mitm, etc
+
* physical exploitation - lockpicking etc
+
* social engineering - exploiting the human
+
* hardware exploitation - vampire clamps etc
+

Revision as of 02:44, 25 April 2012

Exploitation is taking advantage of a vulnerability in a foreign system to gain access or absolute control over the foreign host.

Pages in category "Exploitation"

The following 104 pages are in this category, out of 104 total.