Distributed
Can result in the business paying fines, loss of reputation, & lawsuits due to loss of database contents
ES can validate input fields and use escape characters to fix the vulnerability of the database dump
Used to glorify the hacking group, their beliefs, or the hacker themselves
#3 on the OWASP Top 10 most common hack types
Used as practice for beginner hackers
Can result in loss of reputation and lawsuits due to the customer's personal information being stolen due to phishing
Hacks by injecting HTML and JavaScript in the URL Bars & Entry Fields
Hacks by replacing the homepage or index file
Getting a specific firewall will fix the issue
Intent is to shut down a website or company
#1 on the OWASP Top 10 most common hack types
Can result in the website being blacklisted or suspended by hosting provider because of the content of the replaced homepage
Denial of
Can result in loss of business due to the website being forced to shut down because of the hack
Service
Hacks by using multiple systems or IP Addresses to flood the bandwidth or resources of website
Hacks by injecting statements in the URL Bars & Entry Fields
Usually a 1-page website is put up in place of the real website
ES can validate input fields and use escape characters to fix the vulnerability of the site being used for phishing
Intent is to steal customer's information and/or use the website for phishing
ES would have to manually remove the cause of a new homepage/index page resolving instead of the correct one
Intent is to hack the database and access its contents (database dump)