Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

A vulnerability


Generally speaking, a vulnerability represents a certain kind of weakness, which, when exploited, allows an attacker to discover more about a system. This could mean reducing information assurance or exposing sensitive data. It is the same when it comes to computer security. Vulnerability is typically the intersection of three essential elements: a system susceptibility, an attacker with access to this susceptibility, and finally a skill required to be able to exploit this flaw.

Vulnerability can be described as:

"A weakness of an asset or group of assets that can be exploited by one or more threats."

- https://en.wikipedia.org/wiki/Vulnerability_%28computing%29

A vulnerability is thus defined as a weak link that provides at least one way of exploitation.

It is obvious that vulnerabilities are one of the biggest problems of today's network security worldwide. Without a doubt, they will be a huge problem in the future too. You may ask yourself, how is a vulnerability created, why...