Ethical Hacking Programming, Blogging, Hosting, All Computer Software, PC Software Download, JAVA in hindi, HTML, PHP, C, C++, Free Learning, Software's Download, Technical Videos, Technical Tricks and Tips, How Make Money

Exploitation how to Exploit hacking

Exploitation  how to Exploit

what is Exploitation hacking


The exploitation program is a piece of software or script that hackers can control over a system, exploit its vulnerabilities. To find these vulnerabilities hackers usually use vulnerability scanners such as NESUS, NEXUS, OpenVAS etc.
Metasplight is a powerful tool for detecting vulnerabilities in the system.


On the basis of weaknesses, we find out exploitation. Here, we will discuss some of the best vulnerability search engines you can use.

Exploitation database
Www.exploit-db.com is the place where you can find all the related work related to one
Vulnerability


Common Weaknesses/Vulnerabilities and Exposure Common Weaknesses and Exposure (CVEE) is the standard for information security vulnerability. CVE publicly known information is a dictionary of security vulnerabilities and exposures. It is free for public use https://cve.mitre.org



National Vulnerability Database
The National Vulnerability Database (NVD) standards are the US Government's stock
Based vulnerability management data enables this automation of data vulnerability
Management, security measurement, and compliance. You can find this database at https://nvd.nist.gov

NVD includes the security checklist, security related software defects, misconfiguration, product names, and database of impact metrics.


In general, you will see that there are two types of exploitation:

Remote Exploits - This is the type of factors where hackers use remote exploits to access the system located in remote locations, where you do not have access to remote systems or networks.

Local exploitation - Local exploits are usually used by the user with access to a local system, but he wants to surpass his rights.

Quick Fix

Vulnerabilities generally arise due to missing updates, so it is recommended that you update your system on a regular basis, for example, once a week.
In Windows environment, you can activate automatic updates by using the options available in the Control Panel System and Security Windows Updates.


In Linux Centos, you can use the following command to install automatic update package. 

yum -y install yum-cron




Share:

Related Posts:

No comments:

Post a Comment

Follow On YouTube