Ethical Hacking - Exploitation

A script or programmed software which can allow hackers to take control over a system, exploiting its vulnerabilities is known as Exploitation. Hackers normally use vulnerability scanners like Nessus, Nexpose, Vega, OpenVAS, etc. to find these vulnerabilities.

In general, you will see that there are two types of exploits −

Remote Exploits − These are the type of exploits where you don’t have access to a remote system or network. Hackers use remote exploits to gain access to systems that are located at remote places.

Local Exploits − Local exploits are generally used by a system user having access to a local system, but who wants to overpass his rights.