Exploit Attacks
This is another form of hacking. Mostly use for to hack a website or victim PC without send them any file. You can hack the victim PC without Knowing them. For exploit attack techniques many software are available. It basically regularly send the packets to the victim PC to establish a strong connection that is needed to access his/her PC. You can also say that you use SQL injection type thing. Take a look of the picture in which a exploit attacker used:

