Sunday, 26 August 2012

0 Vulnerability, Exploits & Payloads

You must have come across a recent news article stating a website being hacked and home page turning into something dangerous like "Beware!! We are the Hackers" along with the picture of a skull (in most cases to create horror!!) or page being replaced with some explicit content. Ever wondered how hackers breach the security and break into websites or other systems? Today I will discuss how a hacker approaches a system or a website to hack it. 

To break into any system the person (hacker) searches for its vulnerability and then uses the same vulnerability to break into it. Now a question arises:

What is a Vulnerability?

A vulnerability
 is a security hole in a piece of software or hardware which can provide a potential vector to attack a system.
Thus to compromise a system the first step is to find a vulnerabilty in that system.

Ok suppose a hacker has found a vulnerability in a system or a website. What next? What does he/she do with that vulnerabilty? Here comes the term 'Exploit'.

Exploit:

It is a program whose only work is to take advantage of a vulnerability. Exploits often deliver payloads to a target system.

Payload:

Piece of software that allows an attacker to control the exploited system.

Thus to sum it up, the exploit uses a vulnerability to finally deliver the payload, which actually controls the system.


Do comment and provide your feedback regarding this article. If you find this post useful, don’t forget to tweet and share it on Facebook.

0 comments:

 

TechRaaz Copyright © 2012 | Template created by O Pregador