Difference between revisions of "Exploit"
From MgmtWiki
								
												
				 (→Context)  | 
				|||
| Line 7: | Line 7: | ||
==Solutions==  | ==Solutions==  | ||
| − | * [[Indicators of Compromise]] for definitions of discovery when an [[Exploit]] has succeeded against a target.  | + | * See the wiki page on [[Indicators of Compromise]] for definitions of discovery when an [[Exploit]] has succeeded against a target.  | 
==References==  | ==References==  | ||
[[Category: Glossary]]  | [[Category: Glossary]]  | ||
| + | [[Category: Exploit]]  | ||
Revision as of 12:42, 6 September 2022
Contents
Full Title
An Exploit is a malicious implementation of code that takes advantage of a Vulnerability in the design or implementation of a solution.
Context
- Exploits are part of the standard Threat Model
 - Exploits are, as a rule, reported to the CVE
 - As a general rule Attacks are directed at known exploits, but can include simple exploration of the Ecosystem looking for an unknown Vulnerability.
 
Solutions
- See the wiki page on Indicators of Compromise for definitions of discovery when an Exploit has succeeded against a target.