O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Exploit Research with Metasploit

Exploit, in very simple words, is a piece of code or a collection of commands specifically written in a typical format that takes advantage of a vulnerability or weakness in the software/hardware and causes unanticipated behavior to occur. This unintended behavior may be in the form of a system crash, denial of service, buffer overflow, a blue screen of death, or the system being unresponsive. When we talk about exploits, we have something known as a zero-day exploit. A zero-day exploits a security vulnerability on the same day the vulnerability gets known. This means that developers have zero days to address and patch the vulnerability. These are used by attackers to attack vulnerable systems before ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required