Zero Day Attack Flashcards
What is a Zero Day Attack ?
a Zero Day Attack is when a vulnerability is found and exploited that a vendor/defender of a given software is unaware of and is incredibly detrimental to the said software.
Think of something like attacking PayPal on Black Friday and just how incredibly detrimental that could be to their profits and to their customers.
Another very good example of this would be the exploits “Meltdown” and “Specter” used to attack Intel devices and cloud.
1st step:
The hacker discovers a vulnerability.
2nd step:
The hacker exploits the vulnerability before the vendor/defender discovers the vulnerability.
3rd step:
3rd step: Day Zero. The attack takes place (there’s probably a pretty decent amount of chaos at this point).
4th step:
With all the chaos, the vendor has been made aware that there is an issue and begins to patch the vulnerability. (Keep in mind, the vendor will not ALWAYS patch the vulnerability. Older technology could still be massively in use, but the vendor does not find it within value to patch a vulnerability within an older product that they cannot easily turn a profit out of).
5th and 6th step:
The vendor’s patch is created and the vendor’s patch is applied
- - - - - -
Keep in mind that there is significant frame of time between the time a patch is created and when it is applied where the vulnerability is still relevant and can be exploited.