At Defacement (defacement, disfigurement) attack, a web page is changed without authorization. The attack usually affects the visible part of the page, where the“defacers“, also known as “Cracker” (equivalent to hacker), delete texts or integrate foreign texts or graphics. Malicious programs can also be left behind.
How does it work?
At Defacement, security gaps are exploited or security measures are bypassed. For example, passwords can be stolen by means of SQL injection, social engineering, brute force or Cross-Site Scripting stolen in order to penetrate web applications, Webspace or web servers.
Reasons for the Defacement
The dawn of the digital age also marked the beginning of Defacements history. Hacker groups earn a special “reputation” by breaking into servers. In the 1990s, the home page of the U.S. intelligence agency, the CIA, was hacked and the page title changed to“Central Idiots Agency.” Some historical hacking attacks are archived.
White Hat Defacement as a security check
Do you have any more questions?