Questions tagged [zero-day]

A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability.

106 questions
98
votes
7 answers

Why would an attacker ever want to sit on a zero-day exploit?

I am trying to understand why an attacker would want to wait to use a zero-day exploit. I have read that an attacker does not want to waste the zero-day because they are typically very expensive to obtain in the first place, but it is not clear to…
jonem
  • 979
  • 1
  • 7
  • 7
53
votes
2 answers

How are zero days found?

I believe that it was leaked recently that the NSA has a long list of zero day exploits on various software "for a rainy day," ie: for whenever it would be useful to them. The question is, how do they find these zero days? Does someone have to…
Naftuli Kay
  • 6,763
  • 11
  • 49
  • 78
10
votes
6 answers

What is zero day?

More specifically, if a website is using an application already known to have a flaw as part of the larger service it offers (so, say it's using a version of Apache known to have a flaw, and the continued presence of that flaw has been confirmed by…
root
  • 1,537
  • 3
  • 12
  • 20
5
votes
1 answer

What is the procedure for selling a zero- day?

I read this question recently What does it mean to “burn a zero-day”? I then researched on Google and read a few articles, this one "Shopping For Zero-Days" was particularly interesting because there are people that have companies that are in the…
0siris
  • 91
  • 8
3
votes
2 answers

Struts2.3 Zero Day attack exploited: CronJob getting created

Can someone help understand what exactly is being done through this attack. I was using Struts2.3 in Jboss5 environment. I had some crontabs installed, which went missing instead these two lines are seen in crontab. #*/20 * * * * wget -O - -q…
0
votes
3 answers

What sites give the latest information on security threats especially zero day malware

What websites give the latest information on zero day malware or other exploits newly introduced.
Brahmabull
  • 19
  • 2
0
votes
2 answers

Why is always possible to discover and exploit new zero-day vulnerabilities?

Couldn't an updated server/computer be completely sealed against attacks? Why can't you block any incoming request for running something in your server? For example, in my naiv view, a mail server could be getting emails (text files) sending…
0
votes
3 answers

Instead of waiting until zero-day exploits to happen, how to preemptively find zero-day vulnerabilities in order to deter zero-day exploits?

Instead of waiting until zero-day exploits to happen, how to preemptively find zero-day vulnerabilities in order to deter zero-day exploits? There has to be a better way.
Nathan Aw
  • 1
  • 8
  • 12
-1
votes
1 answer

What is Satisfiability Modulo Theories

I came across this term called "Satisfiability Modulo Theories", which when I Googled it, was something that is related to various theories on low level languages. How does this help in discovering 0-days? I also saw people using something called…
-1
votes
1 answer

How to identify Treck TCP/IP library usage in a PC?

I was informed recently about the RIPPLE20 vulnerabilities. Can I identify the usage of a specific protocol on my PC or inside some application on a PC? I think that the first thing to do in these cases is to find the assets that can be influenced…
Ion Stirba
  • 107
  • 6