Exploitation Techniques
- Buffer Overflow: Overwriting memory buffers to execute malicious code.
- SQL Injection: Injecting malicious SQL code to access sensitive data.
- Cross-Site Scripting (XSS): Injecting malicious code into web pages.
- Cross-Site Request Forgery (CSRF): Tricking users into performing unintended actions.
- Remote Code Execution (RCE): Executing malicious code remotely.
- Local File Inclusion (LFI): Accessing sensitive files on a server.
- Directory Traversal: Accessing files outside intended directories.