Introduction
In the Internet community, people can now open their own websites or write their own programs. In these websites and programs, they can share the information that they want and various activities but a security vulnerability may occur in these programs and websites for various reasons. We can separate these vulnerabilities by type (SQL, XSS, etc.) but there is such a vulnerability type that has not been discovered by anyone before and the only solution is to fix it in the fastest time. Because if that vulnerability is discovered, it can cause a big damage every second. This attack is called as Zero Day Attack.
What is Zero Day Attack?
Zero day attack is called to find and exploit a security vulnerability that cannot be found on a website by hackers. If the zero day vulnerability has not been found by anyone before and has been found by an hacker, it is likely that the program or the website owner will suffer a big damage.
Because there is no measure that users can take against these attacks, the only solution is the fix vulnerability by the program owner or site administrators. Fixing the vulnerability in these attacks is not the only solution. Because every second hackers will continue to attack and the damage situation will increase with each passing second. Also hackers can exploit this vulnerability and spread it to all other hackers. Therefore, owner/administrator must be very fast when fixing the vulnerability.
What is Zero Day exploit?
As a result of the hacker finding the Zero Day vulnerability and transforming it into software or script, all other hackers can exploit these vulnerabilities with this expolit. Thus, the size of the attack will be larger and the damage will be higher. To prevent these exploits, administrators should fix this Zero Day vulnerability as soon as possible.
The reasons of Zero Day vulnerability;
1- Developers to publish the program/website without reviewing the mistakes that they make.
2- The program or website is not regularly analyzed for vulnerabilities.
3- Code mistakes made by software developers.
4- Failing to fix the Zero Day vulnerability as quickly.
The result
Zero day attacks are likely to cause a bix/bad damage to the other side but if the vulnerability is fixed immediately and does not become an exploit, there will be loss of damage again but not like this. As an example of this zero day attack, I can give you an example of requesting bitcoin through famous accounts on Twitter.
Translator: Shezzar
Source: Zero Day Attack in Turkish. By the way, thanks to Ellie Williams
In the Internet community, people can now open their own websites or write their own programs. In these websites and programs, they can share the information that they want and various activities but a security vulnerability may occur in these programs and websites for various reasons. We can separate these vulnerabilities by type (SQL, XSS, etc.) but there is such a vulnerability type that has not been discovered by anyone before and the only solution is to fix it in the fastest time. Because if that vulnerability is discovered, it can cause a big damage every second. This attack is called as Zero Day Attack.
What is Zero Day Attack?
Zero day attack is called to find and exploit a security vulnerability that cannot be found on a website by hackers. If the zero day vulnerability has not been found by anyone before and has been found by an hacker, it is likely that the program or the website owner will suffer a big damage.
Because there is no measure that users can take against these attacks, the only solution is the fix vulnerability by the program owner or site administrators. Fixing the vulnerability in these attacks is not the only solution. Because every second hackers will continue to attack and the damage situation will increase with each passing second. Also hackers can exploit this vulnerability and spread it to all other hackers. Therefore, owner/administrator must be very fast when fixing the vulnerability.
What is Zero Day exploit?
As a result of the hacker finding the Zero Day vulnerability and transforming it into software or script, all other hackers can exploit these vulnerabilities with this expolit. Thus, the size of the attack will be larger and the damage will be higher. To prevent these exploits, administrators should fix this Zero Day vulnerability as soon as possible.
The reasons of Zero Day vulnerability;
1- Developers to publish the program/website without reviewing the mistakes that they make.
2- The program or website is not regularly analyzed for vulnerabilities.
3- Code mistakes made by software developers.
4- Failing to fix the Zero Day vulnerability as quickly.
The result
Zero day attacks are likely to cause a bix/bad damage to the other side but if the vulnerability is fixed immediately and does not become an exploit, there will be loss of damage again but not like this. As an example of this zero day attack, I can give you an example of requesting bitcoin through famous accounts on Twitter.
Translator: Shezzar
Source: Zero Day Attack in Turkish. By the way, thanks to Ellie Williams
Son düzenleme: