Difference between revisions of "Exploit"
From MgmtWiki
(→Context) |
|||
Line 7: | Line 7: | ||
==Solutions== | ==Solutions== | ||
− | * [[Indicators of Compromise]] for definitions of discovery when an [[Exploit]] has succeeded against a target. | + | * See the wiki page on [[Indicators of Compromise]] for definitions of discovery when an [[Exploit]] has succeeded against a target. |
==References== | ==References== | ||
[[Category: Glossary]] | [[Category: Glossary]] | ||
+ | [[Category: Exploit]] |
Revision as of 13:42, 6 September 2022
Contents
Full Title
An Exploit is a malicious implementation of code that takes advantage of a Vulnerability in the design or implementation of a solution.
Context
- Exploits are part of the standard Threat Model
- Exploits are, as a rule, reported to the CVE
- As a general rule Attacks are directed at known exploits, but can include simple exploration of the Ecosystem looking for an unknown Vulnerability.
Solutions
- See the wiki page on Indicators of Compromise for definitions of discovery when an Exploit has succeeded against a target.