Concept Flow - Exploitation basics
Find Vulnerability
Craft Exploit Code
Deliver Exploit to Target
Exploit Executes
Gain Unauthorized Access or Control
Maintain Access or Cover Tracks
This flow shows the basic steps an attacker follows to exploit a vulnerability and gain unauthorized control.