Hacking Exploits and when to go post exploit: There's no real answer

Wonder if what you're doing, or wth is it for? TO blame your non-existent impatience and then later, your like "oh, should've trusted the process." Which we may do, should be should in this case.


In penetration testing, it's the same as picking up an unknown something to you, like if you didn't what a toothbrush was or Ig you found some sort of fuel... Let's go with fuel. You pick up or see charcoal or coal on somewhere somehow, but you didn't know it was fuel. If we consider it, whether by holding onto it or developing a memory that it's there, we start to already find clues into the fuels connection, subconsciously. It's nice to know that our brain may know what to do as we may fail into how to recognize in our "awake" awareness. Back to the coal, we go near stoves, discover fire again and again, and then some day we realize, what if the coal or black thingy or dark thingy was put into there? It's just a piece of charcoal... Coal and charcoal are two different things but the point is, if you are familiar with how fire consumes, especially what it does, fuel would be important, because of "purpose" for not dying. Literally what everything draws back to on instinct, whatever. Or, sometimes it may be foreshadowing the event of fuel in it's purpose, after discovering the coal, we don't know till further pursuit. Pursuit that was meant to be through effort or curiosity, which is fun given our natural drive, a powerful thing, but we must be disciplined in it. And that's the thing with penetration testing, a supporting role in cybersecurity or ethical hacking, however this may be categorized, that would be penetration testing.

Even now, when parts didn't make sense or if you connected dots, it's from the SAME THING! Your beautiful mind. Anyhow, we start making connections and start building UP. Meaning, to advance and not deter. And it's the same with exploits.

Exploitation are, "The act of employing to the greatest possible advantage", according to Brave's SE from using "expoitatino meaning" as a query. Whatever again. To put it in my terms though, it's connecting the dots, and then utilizing structure for before understanding, and when put through risk, it is an exploit. For example, if people didn't know about pedophiles, right? What would happen, in a world like this? We start to think, even if we don't have kids, pedophiles start to spread. Something about it, makes us think, and you tell me. But, as a pedophile is predator, they are movements, acknowledgements, recognition, and muscle memory where their power of discipline isn't in something right. What could it be to "fix this" but there are reasons the saying is known that we can't fix a person, it is up to them/he/she. So we observe, go along, maybe even find clues and traces to overall, put a stop to them. That is all, really, until justice is served. Believing it is the same with ethical hacking, specifically black box testing if you'd like to know, or just penetration testing again. It's that, we find exploits, or traces to something hack, or manipulate flawlessly from our same perspective, with a wider view because eventually, that predator, pedophile, or system is going to slip, everyone gets tired that may be the perfect time to strike. There are other reasons and circumstances, but you get the gist. It is the build up to that moment that you have been exploiting enough to finish the job. Now, in this case, we have different jobs and we're not perfect, but the best thing to do is to do the right thing despite how people look at you, find another way because I believe you have anyways.

portosbakery.com

Have a nice day!

Comments