Skip to main content


At Defacement (defacement, disfigurement) attack, a web page is changed without authorization. The attack usually affects the visible part of the page, where the“defacers“, also known as “Cracker” (equivalent to hacker), delete texts or integrate foreign texts or graphics. Malicious programs can also be left behind.

How does it work?

At Defacement, security gaps are exploited or security measures are bypassed. For example, passwords can be stolen by means of SQL injection, social engineering, brute force or Cross-Site Scripting stolen in order to penetrate web applications, Webspace or web servers.

Reasons for the Defacement

The dawn of the digital age also marked the beginning of Defacements history. Hacker groups earn a special “reputation” by breaking into servers. In the 1990s, the home page of the U.S. intelligence agency, the CIA, was hacked and the page title changed to“Central Idiots Agency.” Some historical hacking attacks are archived.

White Hat Defacement as a security check

Less directed at the public and more directed at the commercial providers of the server or site are the invisible code fragments left by hackers. These may contain malware or merely serve as proof of access. A distinction can be made between black hats (criminals) and white hats (security experts).

Do you have any more questions?

Please contact us

Further contents