From f343ef4d92352f9fc442aeb9c8b1abee27d74c62 Mon Sep 17 00:00:00 2001 From: luxagraf Date: Tue, 28 Apr 2020 10:24:02 -0400 Subject: cleaned up wired import --- .../Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt | 9 --------- 1 file changed, 9 deletions(-) delete mode 100644 old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt (limited to 'old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt') diff --git a/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt b/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt deleted file mode 100644 index 80ca4a7..0000000 --- a/old/published/Webmonkey/Monkey_Bites/2007/08.13.07/Mon/unhack.txt +++ /dev/null @@ -1,9 +0,0 @@ -Facebook wasn't the only site with security troubles this weekend. The United Nations website was attacked by "hacktivists," who replaced speeches by secretary-general Ban Ki-Moon with pacifist messages. - -As with the [Facebook code breach][3], the U.N. site left itself open to attack by failing implement industry standard security measures. In the case of the U.N., hackers gained access via a well-documented SQL injection flaw (passing unescaped strings, which allowed the attacker to inject their own SQL). - -While the site was quickly restored and the injected content removed, Hackademix, a security blog, [captured the attack in some screenshots][1]. Hackademix also [notes][2] that the U.N. site is likely not yet protected against similar attacks in future. - -[1]: http://hackademix.net/wp-content/uploads/2007/08/un-ss2.png -[2]: http://hackademix.net/2007/08/12/united-nations-vs-sql-injections -[3]: http://blog.wired.com/monkeybites/2007/08/amatuer-program.html \ No newline at end of file -- cgit v1.2.3-70-g09d2