diff options
author | luxagraf <sng@luxagraf.net> | 2020-04-28 10:24:02 -0400 |
---|---|---|
committer | luxagraf <sng@luxagraf.net> | 2020-04-28 10:24:02 -0400 |
commit | f343ef4d92352f9fc442aeb9c8b1abee27d74c62 (patch) | |
tree | 4df5c497e7caeab1f8932df98ad3d00fef228a3e /old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt | |
parent | a222e73b9d352f7dd53027832d04dc531cdf217e (diff) |
cleaned up wired import
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt')
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt | 9 |
1 files changed, 0 insertions, 9 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt b/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt deleted file mode 100644 index 80ca4a7..0000000 --- a/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt +++ /dev/null @@ -1,9 +0,0 @@ -Facebook wasn't the only site with security troubles this weekend. The United Nations website was attacked by "hacktivists," who replaced speeches by secretary-general Ban Ki-Moon with pacifist messages. - -As with the [Facebook code breach][3], the U.N. site left itself open to attack by failing implement industry standard security measures. In the case of the U.N., hackers gained access via a well-documented SQL injection flaw (passing unescaped strings, which allowed the attacker to inject their own SQL). - -While the site was quickly restored and the injected content removed, Hackademix, a security blog, [captured the attack in some screenshots][1]. Hackademix also [notes][2] that the U.N. site is likely not yet protected against similar attacks in future. - -[1]: http://hackademix.net/wp-content/uploads/2007/08/un-ss2.png -[2]: http://hackademix.net/2007/08/12/united-nations-vs-sql-injections -[3]: http://blog.wired.com/monkeybites/2007/08/amatuer-program.html
\ No newline at end of file |