Home Tags Exploit

Tag: exploit

There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available. This is the reason why some black hat hackers do not publish their exploits but keep them private to themselves or other hackers. Such exploits are referred to as zero day exploits and to obtain access to such exploits is the primary desire of unskilled attackers, often nicknamed script kiddies.

New WikiLeaks dump: The CIA built Thunderbolt exploit, implants to target...

Enlarge / One of these things is a CIA implant dropper. (credit: From an original image by Scott Ackerman) WikiLeaks today dumped a...

The cost of launching a DDoS attack

A distributed denial-of-service (DDoS) attack is one of the most popular tools in the cybercriminal arsenal.The motives behind such attacks can vary – from...

SAP Vulnerability Puts Business Data at Risk for Thousands of Companies

Researchers at ERPScan today disclosed details and a proof-of-concept exploit for a SAP GUI remote code execution vulnerability patched last week.

VU#600671: PCAUSA Rawether for Windows local privilege escalation

Vulnerability Note VU#600671 PCAUSA Rawether for Windows local privilege escalation Original Release date: 21 Mar 2017 | Last revised: 21 Mar 2017

What should password managers not do? Leak your passwords? What a...

Two critical bugs blatted in Chrome, Firefox add-ons Password vault LastPass has patched critical security flaws that malicious websites could exploit to steal millions...

Amid boycott, Google changes ad policy to give advertisers more control

Enlarge (credit: Philippe Huguen/Getty Images) Last week, the UK government halted taxpayer-funded advertising on YouTube and Google because some of its ads appeared on extremist content.Today,...

A simple command allows the CIA to commandeer 318 models of...

Cisco Systems said that more than 300 models of switches it sells contain a critical vulnerability that allows the CIA to use a simple command...

Leading Linux distros dawdle as kernel flaw persists

A local privilege esclation flaw has been fixed in the Linux kernel, but several upstream distributions have yet to release updates.Administrators should plan on...

Microsoft’s silence over unprecedented patch delay doesn’t smell right

Enlarge (credit: Alachua County) Last month, Microsoft took the unprecedented step of canceling Patch Tuesday, the company's monthly release of security fixes for its...

VU#214283: Commvault Edge contains a buffer overflow vulnerability

Vulnerability Note VU#214283 Commvault Edge contains a buffer overflow vulnerability Original Release date: 16 Mar 2017 | Last revised: 16 Mar 2017

Where Have All The Exploit Kits Gone?

For a long time, exploit kits were the most prolific malware distribution vehicle available to attackers. Where did they go and what’s replaced them?...

VU#834067: Apache Struts 2 is vulnerable to remote code execution

Vulnerability Note VU#834067 Apache Struts 2 is vulnerable to remote code execution Original Release date: 14 Mar 2017 | Last revised: 14 Mar 2017