Most voted "exploit" questions
An exploit is a piece of software, a piece of data or a sequence of commands that take advantage of a defect, failure or vulnerability in order to cause an accidental or unforeseen behavior to occur in a computer’s software or hardware or in some electronic (usually computerized). Such behavior often includes things like gaining control of a computer system. If the doubt is not about "Exploit", do not use this tag.
Learn more…4 questions
Sort by count of
-
1
votes0
answers54
viewsTrying to access browserconfig.xml could be some kind of attack?
Here in the company where I work, we put in a certain system, made in Laravel 4, a system of sending emails every time some kind of error occurs in requests. We started to distrust some activities,…
-
0
votes1
answer414
viewsHow Exploits are created?
I was researching server security, and I ran into the subject of exploits, I already understood the logic of a DDOS attack and an exploit buffer overflow, but I’m curious about one thing: How do…
-
0
votes0
answers31
viewsWhat is PHP object injection?
I was taking a look at owasp’s articles on safety and would like to understand what is the PHP Object Injection my English is not very good so in my search I found that topic in Brazilian…
-
-2
votes0
answers26
viewsDoubt result of Python exploit
Hello, I’m new to programming, I’m running the following python exploit: https://www.exploit-db.com/exploits/45001 Code here from the exploit: import sys import time from pwn import * # parameters…