Zero Day Exploit explained under 2 mins
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=PNgIJXodwic
1. A Software has a vulnerability which is unknown to Software's Programmer (i.e. he has no-day knowledge) but known to hacker. • 2. Hacker uses it to hack the systems which have this software. • 3. The Day it comes into knowledge of vender, it is the zero-day vulnerability, the next day, it will be 1-day vulnerability and so on. • 4. The hacking of a system using zero-day vulnerability is called zero-day exploitation. • https://en.wikipedia.org/wiki/Zero-da...) . • Links to Channel's Playlists • Information Security Management: • Due Care Due Diligence - Informatio... • Network Security: • Virtual Private Network (VPN) - Anima... • Information Security Architecture: • Authentication Methods, Attacks Con... • Information Security Operations: • USB History Viewer (without any Softw... • Information Security Testing: • hackthebox (HTB) Invitation Code - Le... • Application Security: • cross site scripting • Cyber Security: • NASA got Hacked • Subscribe to Channel: / @cybersecurityentertainment
#############################
