Exploiting

Exploits are related to security vulnerabilities.

Exploiting these vulnerabilies involves detection of them and then using the correct method of penetration.

Some vulnerabilities are:

  • RFI
  • XSS
  • LFI
  • SQL injection