ã¨ã¯ã¹ããã¤ã (è±: exploit) ã¨ã¯ãæ å ±ã»ãã¥ãªãã£ã«ããã¦ãèå¼±æ§ãå©ç¨ãã¦ã³ã³ãã¥ã¼ã¿ãæ»æããããã®å ·ä½çãªæ段ãã¾ãã¯ãèå¼±æ§ãå©ç¨ãã¦æ¨çãæ»ç¥ãããã¨ããã[1]ã ã¨ã¯ã¹ããã¤ãã¨ã¯ãã³ã³ãã¥ã¼ã¿ã®ã½ããã¦ã§ã¢ããã¼ãã¦ã§ã¢ã®èå¼±æ§ãå©ç¨ããã³ã³ãã¥ã¼ã¿ã«ç°å¸¸ãªåä½ããããããã«æ¸ããããã¹ã¯ãªããã¾ãã¯ã³ã¼ãã§ãããèå¼±æ§ãæ¤è¨¼ããããã®å®è¨¼ã³ã¼ã(Proof of conceptï¼PoC)ãæããã¨ããããã¾ããåè¨ã®ãããªã¹ã¯ãªãããããã°ã©ã ãç¨ãã¦æ»æãããã¨èªä½ãã¨ã¯ã¹ããã¤ãã¨å¼ã°ãã[2]ããã®ãããåè¨ã®ãããªã¹ã¯ãªãããããã°ã©ã ã«ã¤ãã¦ã¯ãã¨ã¯ã¹ããã¤ãã³ã¼ã(exploit code)ã¨å¼ãã§åºå¥ããå ´åããããã¨ã¯ã¹ããã¤ãã³ã¼ãã¯ãã³ã³ãã¥ã¼ã¿ã¼ã«å®³ããªãä¸æ£ããã°ã©ã ã®ä¸ç¨®ã§ãããããã¨ã¯ã¹ããã¤ãã³ã¼ãã表示ãåå¾ãè¨è¿°ãä¿åçãã
{{#tags}}- {{label}}
{{/tags}}