Modern Exploits

An exploit run against a vulnerable object will result in a hacker being able to perform actions without authorization. What exactly a hacker can do really depends on the type of exploit used against our weaknesses. There are several classifications for exploits; we will take a look at the most common and important ones in this section:

  • DoS

  • Penetration

  • Entry-point searching

  • Back doors

  • Cracking

  • Social engineering

  • Chained exploits

DoS Exploits

DoS attacks are by far the most commonly practiced exploits. The reason for this is quite simple; they are the easiest and quickest ways to affect an object. Anyone at all can run a successful DoS attack using only a low-end desktop and some easily obtainable hacker tools. It is simply a matter ...

Get Inside the Security Mind: Making the Tough Decisions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.