
The Cybercriminal’s Toolkits 235
Destruc(on,modifica(on,
replacementofcontentsin
ordertochangethe
appearanceofawebsite/
webpage
Figure 8.12 A defacement attack.
If they are not well protected, web-based applications are vulnerable and
can expose the whole information system of an organization to cyberattacks.
Common security measures, such as rewalls, however, generally allow web
traf c by default. An attacker can gain access to a server – indeed, to the
whole private network – by exploiting vulnerabilities in the application. After
gaining access to a web server, an attacker can perpetrate a defacement ...