Identify and understand vulnerabilities and exploits
In this section, we will cover understanding vulnerabilities and exploits, reviewing how to identify information about vulnerabilities in the CVE database.
A vulnerability is a flaw in our application’s code or in the configuration that it generates that an attacker can exploit to change the application’s behavior, such as injecting code or accessing private data.
A vulnerability can also be a weakness in the security of a system that can be exploited to gain access to that system. These vulnerabilities can be exploited in two ways: remotely and locally.
A remote attack is an attack that is carried out from a computer other than the victim’s computer, while a local attack, as the name implies, is carried out locally on the victim’s computer. These attacks are based on a series of techniques designed to gain access and elevate privileges on that machine.
One of the main problems we have...