>> The word exploit is both a noun and a verb.The noun exploit means a small and focused program, set of data, or a sequence of commandsthat takes advantage of a vulnerability, causing unintended and unanticipated behavior.The verb exploit means to do it.So you use an exploit to exploit a vulnerability.Exploits usually deliver a payload to a system under attackto allow the attacker to penetrate the system.Payload is the actual code that allows hackers to control systems after they've been exploited.Imagine two burglars driving in a van.The driver rams the van into a storefront.The other guy jumps out and starts looting the store.The van would be the exploit and the burglar filling his bags would be the payload.Think of a missile, the rocket, fuel, and everything else in the rocket.That's the exploit.The warhead that does the actual damage, that's the payload.Take out the warhead, and the missile doesn't have a strong impact.Furthermore, a warhead without being delivered by a rocket won't do much either.Rapid7's Metasploit project contains a large public database and frameworkof over 1,600 quality-assured exploits and close to 500 payloads, which explains its name.Metasploit's most popular payload, Meterpreter, allows you to upload and download files toand from a victim's system, take screen shots, collect password hashes, take over the screen,mouse, and keyboard, and even turn on a webcam.Metasploit also contains nearly 50 encoders, which are used to transform the payloadto fool antivirus software and IDSs as well as remove bad charactersthat would crash a target program or system.Offensive securities exploit databaseat www.exploit-db.com contains nearly 40,000 exploits and is a great repositoryfor pen testers and vulnerability researchers.Exploits are added through direct submissions, mailing lists, and other public sources.In fact, when possible, corresponding vulnerable software is includedin the repository to test exploits against.Vulnerable software is usually hard to find due to companies patchingand updating the vulnerabilities and removing the old vulnerable versions from public access.
转载于:https://www.cnblogs.com/sec875/articles/10028500.html