[{"data":1,"prerenderedAt":78},["ShallowReactive",2],{"term-e\u002Fexploit":3,"related-e\u002Fexploit":60},{"id":4,"title":5,"acronym":6,"body":7,"category":40,"description":41,"difficulty":42,"extension":43,"letter":44,"meta":45,"navigation":46,"path":47,"related":48,"seo":54,"sitemap":55,"stem":58,"subcategory":6,"__hash__":59},"terms\u002Fterms\u002Fe\u002Fexploit.md","Exploit",null,{"type":8,"value":9,"toc":33},"minimark",[10,15,19,23,26,30],[11,12,14],"h2",{"id":13},"eli5-the-vibe-check","ELI5 — The Vibe Check",[16,17,18],"p",{},"An exploit is the actual tool or technique used to take advantage of a vulnerability. If the vulnerability is the broken lock, the exploit is the specific trick to pick that lock. Hackers write exploits; defenders patch the locks to make the exploits stop working.",[11,20,22],{"id":21},"real-talk","Real Talk",[16,24,25],{},"An exploit is code or a technique that leverages a vulnerability to cause unintended behavior in a system — typically to gain unauthorized access, escalate privileges, or execute arbitrary code. Exploits can be proof-of-concept (PoC) demos or weaponized tools.",[11,27,29],{"id":28},"when-youll-hear-this","When You'll Hear This",[16,31,32],{},"\"A proof-of-concept exploit was published for the CVE.\" \u002F \"The pentest found an exploitable misconfiguration.\"",{"title":34,"searchDepth":35,"depth":35,"links":36},"",2,[37,38,39],{"id":13,"depth":35,"text":14},{"id":21,"depth":35,"text":22},{"id":28,"depth":35,"text":29},"security","An exploit is the actual tool or technique used to take advantage of a vulnerability.","beginner","md","e",{},true,"\u002Fterms\u002Fe\u002Fexploit",[49,50,51,52,53],"Vulnerability","Zero-Day","Patch","Penetration Testing","Bug Bounty",{"title":5,"description":41},{"changefreq":56,"priority":57},"weekly",0.7,"terms\u002Fe\u002Fexploit","m_h-w7CzmzokhdrlmNLZHb35ixblFFYzerg25N5RjRI",[61,64,68,72,75],{"title":53,"path":62,"acronym":6,"category":40,"difficulty":42,"description":63},"\u002Fterms\u002Fb\u002Fbug-bounty","A bug bounty program pays ethical hackers to find security vulnerabilities in your product.",{"title":51,"path":65,"acronym":6,"category":66,"difficulty":42,"description":67},"\u002Fterms\u002Fp\u002Fpatch","general","A patch is a small update that fixes something specific without replacing the whole program.",{"title":52,"path":69,"acronym":6,"category":40,"difficulty":70,"description":71},"\u002Fterms\u002Fp\u002Fpenetration-testing","intermediate","Penetration testing (pentesting) is hiring ethical hackers to try to break into your own systems before the real bad guys do.",{"title":49,"path":73,"acronym":6,"category":40,"difficulty":42,"description":74},"\u002Fterms\u002Fv\u002Fvulnerability","A vulnerability is a weakness in your code or system that a bad guy could exploit. Like a broken lock on a door.",{"title":50,"path":76,"acronym":6,"category":40,"difficulty":70,"description":77},"\u002Fterms\u002Fz\u002Fzero-day","A zero-day is a vulnerability that nobody knows about yet — except the person who found it. The name means the vendor has had 'zero days' to fix it.",1776518278250]