Exploit
An exploit is a piece of code, software, or technique that takes advantage of a vulnerability in a system to cause unintended behavior, such as gaining unauthorized access or executing arbitrary commands.
In cybersecurity, an exploit is the means by which an attacker leverages a vulnerability to compromise a system. While a vulnerability is a weakness or flaw, an exploit is the specific method used to take advantage of that weakness. Exploits can range from simple scripts to sophisticated tools that chain multiple vulnerabilities together to achieve a desired outcome such as remote code execution, privilege escalation, or data exfiltration.
Exploits are commonly categorized by their delivery method and target. Remote exploits can be executed over a network without prior access to the target system. Local exploits require some level of existing access and are often used for privilege escalation. Client-side exploits target applications like web browsers, email clients, or document readers, typically requiring user interaction such as clicking a malicious link or opening a crafted file.
The exploit lifecycle follows a predictable pattern. A vulnerability is discovered, an exploit is developed (either by security researchers or malicious actors), and eventually a patch is released by the vendor. The window between exploit availability and patch deployment represents a critical risk period. Exploit databases like Exploit-DB and frameworks like Metasploit catalog known exploits, serving both security professionals conducting authorized testing and as a reference for defensive teams.
Organizations defend against exploits through multiple layers: keeping software patched, deploying intrusion detection and prevention systems, using endpoint protection platforms with exploit prevention capabilities, implementing network segmentation, and applying the principle of least privilege to limit the impact of successful exploitation.