Vulnerability, Exploit, and Payload

1 min read
“Vulnerability, Exploit, and Payload Explained with Simple Cybersecurity Examples”
Vulnerabilities:- the actuall weekness of the system through which attacker can attack (e.g., a website not validating user input → SQL Injection vulnerability)
Exploit :- the tool(a suspicious code ) that attacker uses to take advantage from the weekness (e.g., attacker sends a crafted SQL query like ’ OR ‘1’=‘1
to bypass login)
Payload:- the actual task you do after geeting inside the system (e.g., dumping the database, uploading a web shell, or installing ransomware)
0
Subscribe to my newsletter
Read articles from Vishant G directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
