A backdoor is when a hacker tries a number of different user credentials in an effort to guess the right ones.
A threat known as a zero-day attack aims to take advantage of a software application vulnerability before the vendor of the application learns of it and before the vulnerability is widely publicized by the internet security community.
A piece of code that exploits a software weakness or security fault is called an exploit. It is created either by malicious actors for use in their operations or by security researchers as a proof-of-concept threat.
to know more about hackers here:
brainly.com/question/29215738
#SPJ4