-
Notifications
You must be signed in to change notification settings - Fork 13
Motivation
Duong Tieu Dong edited this page Jul 14, 2021
·
3 revisions
Defacement attacks are performed in the hopes of:
- Causing political conflict
- Showing off
- Warning the system administrator
Some common attack techniques that has been used in defacement attacks are:
- SQL Injection
- Command Injection
- Path Traversal
- Remote/Local File Inclusion
- File Upload
- XXE
Numerous techniques have been developed to detect defacement attacks are:
- Hash comparison
- Signature based detection
- Differential comparison in the source code and DOM Tree
- Machine Learning (Abnormally detection & Image classification)