Thursday, July 1, 2010

Example Of Banquet Programs

Defacing. Deface. Defacement (Part I) By Blizzacjk

After a couple of weeks away .. I bring a bit
what is known as Deface (Defacing)
We've seen some issues like:
Carding: Using credit cards for profit outside
Hacking: It concerns mainly remote unauthorized entries through communication networks as the Internet. Most of these programmers and designers who are passionate about security infermotica.
Defacing: is the modification of a page site without permission of the owner thereof.

injeccion Through SQL, DDOS attacks, even other already mentioned as pharming.
Most of the time manage to get access Defacer a site using a vulnerability that the developer has left in it.

One of the main problems is the SQL injection, it is inserting data into the DB to get some hits and / or modify the site to have. (Usually the Index of it) Other SQL
evuelven inyects that username and password. (The vast majority of known)

This practice is very common most of all in places where the focus is political and HACKING.

Most of these deface are made with 2 reasons:

1 º Deface lamerial, which is to leave a message on the index or modify, for example: "I am your father for having kagado on your website"

2 º Deface By a good hacker, the term good hacker does not mean it is good the person if not, if you see any error or bug's immediately report back to the administrator, as they learned of the bug and how it can explode, can you give thanks for warn or to give you some change.

The defacing also be used for personal privileges! Remember that you would be logeando on the site as administrator.

O is also what I call freedom of expression;


And to finish this article Defacing of many who can come, I leave you a video tutorial created and produced .. by Blizzacjk



0 comments:

Post a Comment