diff options
author | luxagraf <sng@luxagraf.net> | 2019-05-04 15:48:55 -0500 |
---|---|---|
committer | luxagraf <sng@luxagraf.net> | 2019-05-04 15:48:55 -0500 |
commit | 79fafe2f44f5e31522dd93013950474342bfdfb0 (patch) | |
tree | bc9ccf5b4eadeebf3a2f86b21f9b382edfa41735 /old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt | |
parent | 62167091560c908db0613bcb35ff9ae8292f5961 (diff) |
archived all the stuff from freelancing for wired
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt')
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt b/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt new file mode 100644 index 0000000..80ca4a7 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt @@ -0,0 +1,9 @@ +Facebook wasn't the only site with security troubles this weekend. The United Nations website was attacked by "hacktivists," who replaced speeches by secretary-general Ban Ki-Moon with pacifist messages. + +As with the [Facebook code breach][3], the U.N. site left itself open to attack by failing implement industry standard security measures. In the case of the U.N., hackers gained access via a well-documented SQL injection flaw (passing unescaped strings, which allowed the attacker to inject their own SQL). + +While the site was quickly restored and the injected content removed, Hackademix, a security blog, [captured the attack in some screenshots][1]. Hackademix also [notes][2] that the U.N. site is likely not yet protected against similar attacks in future. + +[1]: http://hackademix.net/wp-content/uploads/2007/08/un-ss2.png +[2]: http://hackademix.net/2007/08/12/united-nations-vs-sql-injections +[3]: http://blog.wired.com/monkeybites/2007/08/amatuer-program.html
\ No newline at end of file |