Weaknesses in the design, implementation, or configuration of computer systems that can be exploited by attackers
Attack vector
A path which a hacker/attacker can gain access to a computer or network to deliver a payload or exploit.
Types of vulnerabilities
Software
Hardware
Network
Social engineering
Software vulnerabilities
Weaknesses in computer software that can be exploited to gain unauthorised access to the system, steal data, alterinformation, or disrupt normal system operations
Can be caused by coding errors, security flaws, or system misconfigurations
Hardware vulnerabilities
Weaknesses in a computer's hardware components that can be exploited to gain unauthorised access to the system and steal or harm data
Can be caused by physical design flaws, manufacturing defects, or system misconfigurations
Network vulnerabilities
Weaknesses in a system's networking components that can be exploited to gain unauthorized access to the system, steal or alter data
Can be caused by insecureprotocols and improper configuration settings
Social engineering vulnerabilities
Weaknesses in a system's users that can be exploited to gain unauthorised access to the system
Can be caused by gullible users, lack of awareness, or unenforced security policies
Exploitation techniques
Buffer overflows
Malware
Privilege escalation
Social engineering attacks
Vulnerability scanning
The process of scanning a system for known vulnerabilities, usually with software such as Malware Bytes, Sophos Anti-Virus or Windows Security
What is Buffer Overflow?
Simply where data overflows into programs where it does not belong and rewrites the original data due to memory capacity.