Difference between revisions of "Exploit"

From MgmtWiki
Jump to: navigation, search
(Full Title)
(Context)
Line 5: Line 5:
 
# Exploits are, as a rule, reported to the CVE
 
# Exploits are, as a rule, reported to the CVE
 
# As a general rule [[Attacks]] are directed at known exploits, but can include simple exploration of the [[Ecosystem]] looking for an unknown [[Vulnerability]].
 
# As a general rule [[Attacks]] are directed at known exploits, but can include simple exploration of the [[Ecosystem]] looking for an unknown [[Vulnerability]].
 +
 +
==Solutions==
 +
* [[Indicators of Compromise]] for definitions of discovery when an [[Exploit]] has succeeded against a target.
  
 
==References==
 
==References==
 
[[Category: Glossary]]
 
[[Category: Glossary]]

Revision as of 13:39, 6 September 2022

Full Title

An Exploit is a malicious implementation of code that takes advantage of a Vulnerability in the design or implementation of a solution.

Context

  1. Exploits are part of the standard Threat Model
  2. Exploits are, as a rule, reported to the CVE
  3. As a general rule Attacks are directed at known exploits, but can include simple exploration of the Ecosystem looking for an unknown Vulnerability.

Solutions

References