Ethical Hacking - Exploitation
Exploitation is a piece of programming software or script that can allow hackers to take control of a system, exploiting its vulnerabilities. Hackers normally use vulnerability scanners like Nessus, Nexpose, OpenVAS, etc. to find these vulnerabilities.
Metasploit is a powerful tool to locate vulnerabilities in a system.
Based on the vulnerabilities, we find exploits. Here, we will discuss some of the best vulnerability search engines that you can use.
⏩ALSO READ: Hacking Tools
Exploit Database
ExploitDB is the place where you can find all the exploits related to a vulnerability.
Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures (CVE) is the standard for information security vulnerability names. CVE is a dictionary of publicly known information security vulnerabilities and exposures. It’s free for public use. https://cve.mitre.org
National Vulnerability Database
National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data. This data enables the automation of vulnerability management, security measurement, and compliance. You can locate this database at − https://nvd.nist.gov
NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics.
In general, you will see that there are two types of exploits −
➧Remote Exploits − These are the type of exploits where you don’t have access to a remote system or network. Hackers use remote exploits to gain access to systems that are located at remote places.➧Local Exploits − Local exploits are generally used by a system user having access to a local system, but who wants to overpass his rights.
Thank You✌✌✌