Rosy Chadha, G. S. Shalom, Vivek Kumar Anand, Agam Goel
{"title":"开发开发研究","authors":"Rosy Chadha, G. S. Shalom, Vivek Kumar Anand, Agam Goel","doi":"10.1109/ICCCS55188.2022.10079387","DOIUrl":null,"url":null,"abstract":"A program or collection of instructions designed to exploit the flaws in other applications is known as an exploit. Exploit development is identifying vulnerabilities in apps and software and determining how to gain control of a system; thus, exploit development is critical for the security of digital assets and sensitive data stored on computer systems. Many flaws require an attacker to launch a series of shady actions to set up an exploit. Most of the vulnerabilities occur due to faults in software or system architecture. Attackers write code to exploit these holes to infect the machine with various types of malware which is often built on the collection of exploits and can easily be hidden in plain view of different websites. The hidden code on a website may instantly identify the operating system and programs that are running on a user’s machine, as well as the user’s browser type, and check for any vulnerabilities. In today’s world, the internet is the major cause of spreading many malware, viruses, and embedded scripts. Hence our problem statement will revolve around the detection of malicious and benign URLs and thus testing them to get the type of vulnerability.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Study on Exploit Development\",\"authors\":\"Rosy Chadha, G. S. Shalom, Vivek Kumar Anand, Agam Goel\",\"doi\":\"10.1109/ICCCS55188.2022.10079387\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A program or collection of instructions designed to exploit the flaws in other applications is known as an exploit. Exploit development is identifying vulnerabilities in apps and software and determining how to gain control of a system; thus, exploit development is critical for the security of digital assets and sensitive data stored on computer systems. Many flaws require an attacker to launch a series of shady actions to set up an exploit. Most of the vulnerabilities occur due to faults in software or system architecture. Attackers write code to exploit these holes to infect the machine with various types of malware which is often built on the collection of exploits and can easily be hidden in plain view of different websites. The hidden code on a website may instantly identify the operating system and programs that are running on a user’s machine, as well as the user’s browser type, and check for any vulnerabilities. In today’s world, the internet is the major cause of spreading many malware, viruses, and embedded scripts. Hence our problem statement will revolve around the detection of malicious and benign URLs and thus testing them to get the type of vulnerability.\",\"PeriodicalId\":149615,\"journal\":{\"name\":\"2022 7th International Conference on Computing, Communication and Security (ICCCS)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 7th International Conference on Computing, Communication and Security (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCS55188.2022.10079387\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS55188.2022.10079387","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A program or collection of instructions designed to exploit the flaws in other applications is known as an exploit. Exploit development is identifying vulnerabilities in apps and software and determining how to gain control of a system; thus, exploit development is critical for the security of digital assets and sensitive data stored on computer systems. Many flaws require an attacker to launch a series of shady actions to set up an exploit. Most of the vulnerabilities occur due to faults in software or system architecture. Attackers write code to exploit these holes to infect the machine with various types of malware which is often built on the collection of exploits and can easily be hidden in plain view of different websites. The hidden code on a website may instantly identify the operating system and programs that are running on a user’s machine, as well as the user’s browser type, and check for any vulnerabilities. In today’s world, the internet is the major cause of spreading many malware, viruses, and embedded scripts. Hence our problem statement will revolve around the detection of malicious and benign URLs and thus testing them to get the type of vulnerability.