September 2018
Intermediate to advanced
426 pages
10h 46m
English
As the software and hardware industry has developed, the products launched on the market have presented different vulnerabilities that have been found and exploited by attackers to compromise the security of the systems that use these products. For this, exploits have been developed, which are a piece of software, fragment of data, or a script that take advantage of an error, failure, or weakness, in order to cause unwanted behavior in a system or application, being able to force changes in its execution flow with the possibility of being controlled at will.
There are some vulnerabilities that are known by a small group of people, called zero-day vulnerabilities, which can be exploited through some exploit, also known ...