Exploit (computer security): Difference between revisions
hacked by drac-101code Tag: Incorrectly formatted external link or image |
Undid revision 437393963 by 110.137.181.76 (talk) for vandalism |
||
Line 1: | Line 1: | ||
{{Refimprove|date=September 2010}} |
|||
<html><head><title>H4cked by Drac-101code</title> |
|||
An '''exploit''' (from the [[:wikt:en:exploit#French|same word]] in the [[French language]], meaning "achievement", or "accomplishment") is a piece of [[software]], a chunk of data, or sequence of commands that takes advantage of a [[software bug|bug]], [[glitch]] or [[vulnerability (computer science)|vulnerability]] in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerised). This frequently includes such things as gaining control of a computer system or allowing [[privilege escalation]] or a [[denial of service]] attack. |
|||
==Classification== |
|||
<meta name="keywords" content="H4cked by Ugd-Cyber. lafreeside touch |
|||
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the [[system administrator]]. Exploits against [[client application]]s also exist, usually consisting of modified servers that send an exploit if accessed with client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with [[social engineering (computer security)|social engineering]] method. This is the hacker way of getting into computers and websites for stealing data. |
|||
Another classification is by the action against vulnerable system: [[Authorization|unauthorized]] [[data access]], [[arbitrary code execution]], [[denial of service]]. |
|||
Many exploits are designed to provide [[superuser]]-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. |
|||
Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a [[patch (computing)|patch]] and the exploit becomes obsolete for newer versions of the software. This is the reason why some [[Black hat|blackhat hackers]] do not publish their exploits but keep them private to themselves or other crackers. Such exploits are referred to as '[[Zero-Day Attack|zero day]] exploits' and to obtain access to such exploits is the primary desire of unskilled attackers, often nicknamed [[script kiddie]]s.{{Citation needed|date=February 2008}} |
|||
your site,lamongan freesider for freedoom of education .just a dummy warn from koplakErz,we |
|||
===Types=== |
|||
Exploits are commonly categorized and named by these criteria: |
|||
* The type of vulnerability they exploit (See the article on [[Vulnerability (computing)|vulnerabilities]] for a list) |
|||
* Whether they need to be run on the same machine as the program that has the vulnerability (local) or can be run on one machine to attack a program running on another machine (remote). |
|||
* The result of running the exploit ([[Elevation of Privilege (computing)|EoP]], [[Denial of Service (computing)|DoS]], [[Spoofing attack|Spoofing]], etc.) |
|||
===Pivoting=== |
|||
'''Pivoting''' refers to method used by [[penetration test]]ers that uses compromised system to attack other systems on the same network to avoid restrictions such as firewall configurations, which may prohibit direct access to all machines. For example, an attacker compromises a web server on a corporate network, the attacker can then use the compromised web server to attack other systems on the network. These types of attacks are often called multi-layered attacks. Pivoting is also known as island hopping. |
|||
Pivoting can further be distinguished into proxy pivoting and VPN pivoting: |
|||
are exist and we still have heart to not delete ur data and file so dont be angry..!! sorry |
|||
* '''Proxy pivoting''' generally describes the practice channeling traffic through a compromised target using a proxy payload on the machine and launching attacks from this computer.<ref>[http://www.metasploit.com/redmine/projects/framework/wiki/Pivoting Metasploit Framework Pivoting], [http://www.digitalbond.com/index.php/2010/07/12/metasploit-basics-part-3-pivoting-and-interfaces/ Digital Bond: Metasploit Basics – Part 3: Pivoting and Interfaces]</ref> This type of pivoting is restricted to certain TCP and UDP ports that are supported by the proxy. |
|||
* '''VPN pivoting''' enables the attacker to create an encrypted layer 2 tunnel into the compromised machine to route any network traffic through that target machine, for example to run a vulnerability scan on the internal network through the compromised machine, effectively giving the attacker full network access as if she were behind the firewall. |
|||
Typically, the proxy or VPN applications enabling pivoting are executed on the target computer as the [[payload (software)]] of an exploit. |
|||
==See also== |
|||
* [[Computer insecurity]] |
|||
* [[Computer security]] |
|||
* [[Computer virus]] |
|||
* [[Crimeware]] |
|||
* [[Hacking: The Art of Exploitation Second Edition]] |
|||
* [[IT risk]] |
|||
* [[Metasploit Project|Metasploit]] |
|||
* [[Shellcode]] |
|||
* [[w3af]] |
|||
== References == |
|||
mr.Admin whoever u are..we give you a free vulner scan site,next time ull be paid it |
|||
{{reflist}} |
|||
{{DEFAULTSORT:Exploit (Computer Security)}} |
|||
[[Category:Computer security exploits| ]] |
|||
[[ar:إكسبلويت (أمن الحاسوب)]] |
|||
[[bg:Експлойт]] |
|||
gr33tz=,jatimcrew,racrew,sarkem.MBT.explorecrew,kill9,indonesian hacker,N3,nc |
|||
[[ca:Exploit]] |
|||
[[cs:Exploit]] |
|||
[[de:Exploit]] |
|||
[[es:Exploit]] |
|||
crew,PHL,YcL.Magelangcoder,HN,lampungcyber,binjai cyber,MBT , tofan batam, ikbalz ycl, bintang kejora timur and more,,!! =) coded=//plat$" |
|||
[[eu:Exploit]] |
|||
[[fa:اکسپلویت]] |
|||
[[fr:Exploit (informatique)]] |
|||
[[ko:취약점 공격]] |
|||
/> |
|||
[[id:Exploit]] |
|||
[[it:Exploit]] |
|||
<meta name="keywords" content="H4cked by Ugd-Cyber" /> |
|||
[[he:אקספלויט]] |
|||
[[hu:Exploit]] |
|||
[[mk:Експлоит]] |
|||
[[ja:エクスプロイト]] |
|||
<link href='http://www.j2computerservices.net/Black_Lock.png' rel='shortcut icon'/> |
|||
[[pl:Exploit]] |
|||
[[pt:Exploit]] |
|||
[[ru:Эксплойт]] |
|||
[[tr:Exploit]] |
|||
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> |
|||
[[uk:Експлойт]] |
|||
<script language="JavaScript"> |
|||
<!-- |
|||
function openW (URL,TARGET,OPT) { |
|||
window.onerror=null; |
|||
window.open(URL,TARGET,OPT); |
|||
} |
|||
//--> |
|||
</script></head><body leftmargin="0" topmargin="30" alink="#ffffff" bgcolor="#000000" link="#ffffff" |
|||
text="#ffffff" vlink="#ffffff"> |
|||
<table align="center" border="0" cellpadding="0" cellspacing="0" width="650"> |
|||
<tbody><tr> |
|||
<td align="center" bgcolor="black"> |
|||
</td> |
|||
</tr> |
|||
<tr> |
|||
<td align="center" bgcolor="black"><p><div id="content_10"><div class="boxcontent"><center> |
|||
<b><FONT face="Georgia" size="5" color="#ff0000">H A C K E D B Y A N A K I N D O N E S I A <FONT face="Georgia" size="5" color="#ffffff"> |
|||
<br> |
|||
<img src="http://www.ugd-cyber.org/images/me.gif" border="0" width="750" height="320" /> |
|||
<b><FONT face="Georgia" size="6" color="#ff0000"> |
|||
</font> |
|||
<p align="center" class="style14"> |
|||
<marquee scrollamount="4" width="100%"><span style="font-family: Lucida Console;"><font color="red" size="1">Thanks to : Member Binjai Cyber Team | Batam Cyber team | Aceh Cyber Team | Medan Black Screen | Bangladesh Cyber Army | A+ |CYBER KUNINGAN | MANUSIA BIASA TEAM | CyberJihad.Web.ID | Balihack Family | Bintang Kejora Timurnotfound | zuanbinjai | Chilz Aceh | Mandut Vulr | Tofan Batam | ikbalz YCL | Ebenezer Seven | Wak Yal | Begundal Nyasar | Kemhekpro | Tak Ada Yang Abadi | Udan Deres | Crash Senosci | PlatSbanned | Devil-404 | Zhaogab Dafa | Bintang Szeretkezes | And All My Best Friends And U</font></marquee></p> |
|||
<center><FONT face="Georgia" size="4" color="#ff0000">CopyHack © 2011 ANAK INDONESIA<FONT face="Georgia" size="4" color="#ffffff"></center> |
|||
<br> |
|||
<center><font face="courier new" color="#ff0000" size="2">Contact me at :</font><marquee width="50%" scrolldelay="20" |
|||
scrollamount="2" direction="right" behavior="scroll"><font face="Tahoma" color="#ffffff" size="2">www.ugd-cyber.org or www.ugd-cyber.com</font></marquee><br><br> |
|||
<embed height="1"width="1"allowfullscreen="false"menu="false"pluginspage="http://www.macromedia.com/go/getflashplayer"type="application/x-shockwave-flash"flashvars="file=http://cdn.x.indowebster.com/download/54/tubu4ajggtxyyir9xyqzqhxxbx7d46h2.mp3&frontcolor=0xffffff&backcolor=0x0066ff&lightcolor=0xffffff&logo=http://www.indowebster.com/images/idws.png&autostart=true&usefullscreen=false&showeq=true&repeat"src="http://www.indowebster.com/mediaplayer.swf"> |
|||
</tr> |
|||
</body></html> |
Revision as of 15:50, 2 July 2011
This article needs additional citations for verification. (September 2010) |
An exploit (from the same word in the French language, meaning "achievement", or "accomplishment") is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerised). This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.
Classification
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with social engineering method. This is the hacker way of getting into computers and websites for stealing data.
Another classification is by the action against vulnerable system: unauthorized data access, arbitrary code execution, denial of service.
Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root.
Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete for newer versions of the software. This is the reason why some blackhat hackers do not publish their exploits but keep them private to themselves or other crackers. Such exploits are referred to as 'zero day exploits' and to obtain access to such exploits is the primary desire of unskilled attackers, often nicknamed script kiddies.[citation needed]
Types
Exploits are commonly categorized and named by these criteria:
- The type of vulnerability they exploit (See the article on vulnerabilities for a list)
- Whether they need to be run on the same machine as the program that has the vulnerability (local) or can be run on one machine to attack a program running on another machine (remote).
- The result of running the exploit (EoP, DoS, Spoofing, etc.)
Pivoting
Pivoting refers to method used by penetration testers that uses compromised system to attack other systems on the same network to avoid restrictions such as firewall configurations, which may prohibit direct access to all machines. For example, an attacker compromises a web server on a corporate network, the attacker can then use the compromised web server to attack other systems on the network. These types of attacks are often called multi-layered attacks. Pivoting is also known as island hopping.
Pivoting can further be distinguished into proxy pivoting and VPN pivoting:
- Proxy pivoting generally describes the practice channeling traffic through a compromised target using a proxy payload on the machine and launching attacks from this computer.[1] This type of pivoting is restricted to certain TCP and UDP ports that are supported by the proxy.
- VPN pivoting enables the attacker to create an encrypted layer 2 tunnel into the compromised machine to route any network traffic through that target machine, for example to run a vulnerability scan on the internal network through the compromised machine, effectively giving the attacker full network access as if she were behind the firewall.
Typically, the proxy or VPN applications enabling pivoting are executed on the target computer as the payload (software) of an exploit.
See also
- Computer insecurity
- Computer security
- Computer virus
- Crimeware
- Hacking: The Art of Exploitation Second Edition
- IT risk
- Metasploit
- Shellcode
- w3af