🎩What are Exploits ..Types of Exploits ?
The broadest categorization of exploits separates them into two categories — known and unknown. Known exploits are exploits that researchers have already been discovered and documented. This means that ethical hackers will have a better chance of fighting them: normally, they are addressed in subsequent security updates.
Unknown exploits, also known as zero-day exploits, have not been discovered or documented yet. These exploits can go on for years sometimes without being discovered, and updates will not protect you from them.
Another way to categorize exploits are by defining them as being either client-side or server-side. With client-side exploits, access is gained to a system by some action of the client — this includes clicking on a malicious website, clicking on a malicious link and social engineering. Server-side exploits gain access via a server application where an auxiliary scanner scans your system looking for flaw with which to gain entry.
Common exploit kits
There is an array of exploit kits out there today. They include:
Rig: The most popular. Uses website compromising and malvertising. Used to deliver ransomware
Neutrino: Originating in Russia, this uses malvertising to target Internet Explorer and Flash vulnerabilities
Magnitude: Uses malvertising. Mainly targets systems in Asia
Where can you find discovered exploits?
As mentioned earlier, known exploits will be discovered and documented (hopefully thoroughly). The Exploit Database maintains a public archive that is said to be the ultimate exploit collection. Exploit information is gathered from submissions from the public, and the information is easy to navigate and freely available. .
#hacker #hacking #cybersecurity #cybercrime #ethicalhacker #ethicalhacking #malware #programmer #developer #ccna #cissp #ceh #network #vulnerability #kalilinux #linux #ubuntu #blackhathacker #cyberfraud #carding #bug #bugbounty