-3

I have already read many articles about exploits and also tried to test some on my second PC. I know that the key of using exploits is to upload a payload to the victim which then gets executed (as the instruction pointer got manipulated)

My question is: Is it possible to use exploits for loading payloads to the victim without the need of opening an already malicious file on that computer?

I am asking this because all I read about in the internet was about sending emails with malicious files which then get opened by the victim in order to make the victim's PC communicate with the attacker's PC to make the magic happen.

Jonathan Leffler
  • 730,956
  • 141
  • 904
  • 1,278
TheGuy13
  • 21
  • 1
  • 6

1 Answers1

0

There are many ways of exploiting. It is usually running code on the device. But there are also a lot of other ways. The malicious code can be started by the user, but there are more indirect ways. Stagefright for example (user just views a picture). Some ATMs in Germany could be hacked by blocking the card on the output. And so on...

Jonathan Leffler
  • 730,956
  • 141
  • 904
  • 1,278
Jonas Wilms
  • 132,000
  • 20
  • 149
  • 151