Vulnerability, Exploit, and Payload

Vishant GVishant G
1 min read

“Vulnerability, Exploit, and Payload Explained with Simple Cybersecurity Examples”

Vulnerabilities:- the actuall weekness of the system through which attacker can attack (e.g., a website not validating user input → SQL Injection vulnerability)

Exploit :- the tool(a suspicious code ) that attacker uses to take advantage from the weekness (e.g., attacker sends a crafted SQL query like ’ OR ‘1’=‘1 to bypass login)

Payload:- the actual task you do after geeting inside the system (e.g., dumping the database, uploading a web shell, or installing ransomware)

0
Subscribe to my newsletter

Read articles from Vishant G directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Vishant G
Vishant G