Common Hacks IVersion en ligne Select the correct statements to match the Common Hack. Once you click on a statement, it will tell you the type of hack that statement is a part of. You must select the rest of the statements in order to complete that grouping. The game tells you how many need to select in order to complete that grouping. You have 10 minutes to get all the groupings correct. You have 3 attempts. par Kerry Williams 1 SQLi Hack 2 Defacement Hack 3 DDoS Hack 4 Cross-Site Scripting (XSS) Hack Intent is to hack the database and access its contents (database dump) Hacks by injecting statements in the URL Bars & Entry Fields Can result in the business paying fines, loss of reputation, & lawsuits due to loss of database contents #1 on the OWASP Top 10 most common hack types ES can validate input fields and use escape characters to fix the vulnerability of the database dump Used to glorify the hacking group, their beliefs, or the hacker themselves Hacks by replacing the homepage or index file Used as practice for beginner hackers ES would have to manually remove the cause of a new homepage/index page resolving instead of the correct one Can result in the website being blacklisted or suspended by hosting provider because of the content of the replaced homepage Usually a 1-page website is put up in place of the real website Intent is to shut down a website or company Hacks by using multiple systems or IP Addresses to flood the bandwidth or resources of website Getting a specific firewall will fix the issue Distributed Denial of Service Can result in loss of business due to the website being forced to shut down because of the hack Intent is to steal customer's information and/or use the website for phishing Can result in loss of reputation and lawsuits due to the customer's personal information being stolen due to phishing Hacks by injecting HTML and JavaScript in the URL Bars & Entry Fields ES can validate input fields and use escape characters to fix the vulnerability of the site being used for phishing #3 on the OWASP Top 10 most common hack types