Note: This post is only for educational purposes only
A lot of people have been sending me mails pleading that i should teach them how to hack and deface website which is why am writing this post but on no account should you use this knowledge for illegitimate reasons as you will bear the consequences if you ever get caught. So today, I will explain all the methods used to hack and gain access to a website's database.
What do we know by Website defacement?
This is simply an attack on a website that changes the homepage or appearance of the website. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti, although recently it has become a means to spread messages by politically motivated hacktivists or "cyber protesters"
The most common method of defacement is using SQL injections which allows gaining administrative access. Another method of defacement is through FTP once the username and password are obtained.
Defacements usually consist of an entire page, which contains the Hacker's codename or signature." Sometimes, the Hacker makes fun of the system administrator for failing to maintain website and server security. And, most times, the defacement is harmless and is only done to show off the Hacker's skills.But, we have to be careful as this could be like a distraction to upload malware, copying or deleting essential server files and others. There are several methods of defacing websites Like: SQL Injection, Remote File Inclusion, Local File Inclusion, Cross site scripting, DOS(Denial of Service). But we will be talking about Backdoor Shell. (A backdoor shell can be described as a malicious piece of code (e.g. PHP, Python) that can be uploaded to a website to gain access to files stored on that site. And once it is uploaded, the Hacker can use it to modify, delete, or download any files on the website, or upload theirs.