How do attackers take advantage of system and application vulnerabilities, and what clues help defenders recognize these attacks?
Vulnerability — A weakness that can be exploited.
Exploit — Code or action that uses a vulnerability to attack a system.
Buffer Overflow — More data than memory can handle.
Injection Attack — Attacker inserts malicious code (SQL, command, script).
XSS (Cross-Site Scripting) — Malware inside the browser.
CSRF — Forcing a user to unknowingly perform an action.
Privilege Escalation — Gaining higher permissions than allowed.