Skip to content

Motivation

Duong Tieu Dong edited this page Jul 14, 2021 · 3 revisions

Defacement attacks are performed in the hopes of:

  • Causing political conflict
  • Showing off
  • Warning the system administrator

Some common attack techniques that has been used in defacement attacks are:

  • SQL Injection
  • Command Injection
  • Path Traversal
  • Remote/Local File Inclusion
  • File Upload
  • XXE

Numerous techniques have been developed to detect defacement attacks are:

  • Hash comparison
  • Signature based detection
  • Differential comparison in the source code and DOM Tree
  • Machine Learning (Abnormally detection & Image classification)
Clone this wiki locally