New Activity
Play Matching Game
1. SQLi Hack
2. Defacement Hack
3. DDoS Hack
4. Cross-Site Scripting (XSS) Hack

Distributed

Can result in the business paying fines, loss of reputation, & lawsuits due to loss of database contents

ES can validate input fields and use escape characters to fix the vulnerability of the database dump

Used to glorify the hacking group, their beliefs, or the hacker themselves

#3 on the OWASP Top 10 most common hack types

Used as practice for beginner hackers

Can result in loss of reputation and lawsuits due to the customer's personal information being stolen due to phishing

Hacks by injecting HTML and JavaScript in the URL Bars & Entry Fields

Hacks by replacing the homepage or index file

Getting a specific firewall will fix the issue

Intent is to shut down a website or company

#1 on the OWASP Top 10 most common hack types

Can result in the website being blacklisted or suspended by hosting provider because of the content of the replaced homepage

Denial of

Can result in loss of business due to the website being forced to shut down because of the hack

Service

Hacks by using multiple systems or IP Addresses to flood the bandwidth or resources of website

Hacks by injecting statements in the URL Bars & Entry Fields

Usually a 1-page website is put up in place of the real website

ES can validate input fields and use escape characters to fix the vulnerability of the site being used for phishing

Intent is to steal customer's information and/or use the website for phishing

ES would have to manually remove the cause of a new homepage/index page resolving instead of the correct one

Intent is to hack the database and access its contents (database dump)