Exploitation is the process of gaining access to the system by evading the protection mechanism based on the vulnerability assessment. Exploits can be public or zero-day.