What is the exploitation of a zero day?

Use of zero day is a piece of harmful code that uses vulnerability in a piece of software that the supplier has not yet been discovered. This code can cause great damage before the seller realizes the problem and develops a repair or a new version of the software, and many suppliers carefully test their programs before publishing with regard to zero. Because this type of harmful code relies on vulnerabilities that are not yet known, it may be difficult for computer users to protect themselves from it.

In a simple example of exploiting zero day, a hacker would realize that the new version of the Internet browser has a security bug that could potentially allow a hacker to put hackers into the user's computer. He would write a software installation code and put it on a website or e -mail, so when users came into contact with the code, they would be infected with him. Finally, the Would Software Seller Be aware that there has been a problem and issue a repair to solve the problem and addressesExploits with zero bottom.

The general rule of the Community Community Community is that if someone notices security vulnerability or mistakes that could be a problem, it should report it to the seller. Most ethical computer scientists and people who work with computers do it. However, hackers, malware producers and other less friendly community members usually don't, because they want to use vulnerability before the seller realizes that they exist. In fact, some people specialize in revealing vulnerability and sales.

In terms of hacker, the best exploit with zero day is deployed before the seller sees the problem. In other cases, exploitation may be released during the vulnerability window, the time between the discovery of the problem and the abbot developments that answer. The vulnerability windows may vary in length, depending on the seller, the program and the nature of the problem. Term “Zero Day Exploit”It refers to the idea that the code is released to the "Day Zero" before the supplier recognizes the problem.

people can protect themselves from exploits with zero day withdrawal of new versions and patch of software they use quickly and use credible sources for these patches. If users are not sure whether the call is legitimate to download a new version of the patch, they should go to the supplier's website or call the supplier to confirm that the repair has been issued, and find a secure download source. It is also important to maintain the aggressive firewall gate, as it can maintain a malicious code at bay.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?