Exploit Does What?

Diposkan oleh : ghetux On 12:31 PM

Exploit does what did you say? Now, a lot of us have heard of computer viruses, bugs, trojans and even the increasingly popular malware, but exploit, that might be a new one on many.


Basically, Exploit is a piece of software, a line of code, or a number of commands, that has evil designs on your computer.


Oddly, it originates from the French word of the same spelling and it’s literal meaning is achievement. I suppose it depends on whose point of view, the criminal fraternity from where they originate, or yours.


Because for you, it’s bad news, as exploit software is intended to disrupt computer software

by force. And such aggressive attacks might manifest themselves by seizing control, denying the rightful owner access, or allowing privileged escalation.


But the true meaning of exploit is not lost on those who fall prey to it. Simply put, it exploits a vulnerable computer system, or network, and that vulnerability is usually brought about by a software design fault, or bug. Hence the word exploit – it exploits a weakness in the original code.


And there are a number of exploits out there. For example, a remote exploit will attack a vulnerable system without prior access. Whereas a local exploit will already have gained prior access.


What is particularly nasty about an exploit, is that it can be used to build up the level of control and gradually take over the whole system, and this is why it is most often targeted at computerised networks. It’s aim is to take control of the system administrator; and if you imagine the power that a bogus administrator could wield, it really represents a very severe threat indeed.


And the exploit, once it’s found it’s home, can effectively morph, and replicate, meaning that the original nasty piece of software is deleted, but the ones remaining, are worse than the original and can reap even worse damage.


So, particularly unpleasant and just in case you wanted to know what a previous phrase used in this article means - privileged escalation – here goes. It basically entails what’s already been discussed, the act of placing, with malicious intent, some software of your own creation, within a computer system that has an existing weakness and by doing so, you are able to enjoy the same privilege of control as that enjoyed by the system administrator.


Understood? Well, whatever the definition, an exploit can give the IT guys a major nightmare, so, be on your guard.


This article was written by eCommerce Associates Limited for eCommerce Associates for Mcafee Downloads Internet Security

Category : | Read More......

0 Response to "Exploit Does What?"

About Me

My photo
"im the man not superman"

SPONSOR


Masukkan Code ini K1-YA6F17-2
untuk berbelanja di KutuKutuBuku.com

Followers