A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability.
Questions tagged [zero-day]
106 questions
98
votes
7 answers
Why would an attacker ever want to sit on a zero-day exploit?
I am trying to understand why an attacker would want to wait to use a zero-day exploit.
I have read that an attacker does not want to waste the zero-day because they are typically very expensive to obtain in the first place, but it is not clear to…
jonem
- 979
- 1
- 7
- 7
53
votes
2 answers
How are zero days found?
I believe that it was leaked recently that the NSA has a long list of zero day exploits on various software "for a rainy day," ie: for whenever it would be useful to them.
The question is, how do they find these zero days? Does someone have to…
Naftuli Kay
- 6,763
- 11
- 49
- 78
10
votes
6 answers
What is zero day?
More specifically, if a website is using an application already known to have a flaw as part of the larger service it offers (so, say it's using a version of Apache known to have a flaw, and the continued presence of that flaw has been confirmed by…
root
- 1,537
- 3
- 12
- 20
5
votes
1 answer
What is the procedure for selling a zero- day?
I read this question recently What does it mean to “burn a zero-day”?
I then researched on Google and read a few articles, this one "Shopping For Zero-Days" was particularly interesting because there are people that have companies that are in the…
0siris
- 91
- 8
3
votes
2 answers
Struts2.3 Zero Day attack exploited: CronJob getting created
Can someone help understand what exactly is being done through this attack.
I was using Struts2.3 in Jboss5 environment.
I had some crontabs installed, which went missing instead these two lines are seen in crontab.
#*/20 * * * * wget -O - -q…
Anirudh shetty
- 31
- 3
0
votes
3 answers
What sites give the latest information on security threats especially zero day malware
What websites give the latest information on zero day malware or other exploits newly introduced.
Brahmabull
- 19
- 2
0
votes
2 answers
Why is always possible to discover and exploit new zero-day vulnerabilities?
Couldn't an updated server/computer be completely sealed against attacks? Why can't you block any incoming request for running something in your server?
For example, in my naiv view, a mail server could be getting emails (text files) sending…
0
votes
3 answers
Instead of waiting until zero-day exploits to happen, how to preemptively find zero-day vulnerabilities in order to deter zero-day exploits?
Instead of waiting until zero-day exploits to happen, how to preemptively find zero-day vulnerabilities in order to deter zero-day exploits? There has to be a better way.
Nathan Aw
- 1
- 8
- 12
-1
votes
1 answer
What is Satisfiability Modulo Theories
I came across this term called "Satisfiability Modulo Theories", which when I Googled it, was something that is related to various theories on low level languages. How does this help in discovering 0-days? I also saw people using something called…
Santhosh Kumar
- 25
- 2
-1
votes
1 answer
How to identify Treck TCP/IP library usage in a PC?
I was informed recently about the RIPPLE20 vulnerabilities.
Can I identify the usage of a specific protocol on my PC or inside some application on a PC?
I think that the first thing to do in these cases is to find the assets that can be influenced…
Ion Stirba
- 107
- 6