An attack takes advantage of an existing vulnerability. For example, suppose a malicious user knows that some users have weak passwords and tries guessing them until gaining access to restricted resources.
© 1997-1999 Microsoft Corporation. All rights reserved.