H@CK M1RR0R
Home
Archive
Special Archive
Events
Notify
Onhold
Stats
Ranking
Login
Register
Defacement Notification (OnHold)
Submitting as
Guest
Default per domain minimum interval:
129600
minute(s).
TLD rules may override the default per-domain interval.
Blacklisted folders:
cgi-bin, image, img
Submission mode
Single URL
Multi URL (up to 10)
Warning
A defacement is considered in all countries an unauthorized computer access, a denial of service action therefore a CRIME under all means, even if you don't think so. The activity of defacing to warn the administrator of a bugged server about its vulnerable status is considered a crime too and a questionable ethical conduct.
H@CK M1RR0R accepts your notifications but doesn't support, condone, justify at all any defacing activity. Instead, we welcome you to stop such activity or else you might face the same destiny of some notorious defacers who got arrested and jailed. See the following examples:
http://www.theregister.com/2005/06/28/deceptive_duo_hacker_jailed
http://www.theregister.co.uk/2005/10/27/secfocus_hacker_deport/page2.html
You might want to consider instead, the possibility to quit your ILLEGAL activity before getting jailed (because you will) as other defacers did before you. See this example:
http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=12044&mode=thread&order=0&thold=0
If you have any question or if you need any help or advice to convince you about all of the above, feel free to contact any of the H@CK M1RR0R staff members.
DISCLAIMER: all the information contained in H@CK M1RR0R's cybercrime archive were either collected online from public sources or directly notified anonymously to us. H@CK M1RR0R is neither responsible for the reported computer crimes nor it is directly or indirectly involved with them. You might find some offensive contents in the mirrored defacements. H@CK M1RR0R didn't produce them so we cannot be responsible for such contents.
If you are the administrator of an hacked site which is mirrored in H@CK M1RR0R, please note that H@CK M1RR0R is not related at all with the defacements itself.
Don't ask us to remove the mirror of your defaced website, as a cybercrime archive H@CK M1RR0R's mission is to keep the entries in the database.
All the self-produced material belongs to H@CK M1RR0R. You are free to use it as long as proper credits to H@CK M1RR0R are reported as by the CC license reported below.
H@CK M1RR0R is not responsible for the use/misuse of the published information, you can use it at your own risk.
This Website uses the Geolocation databases from Maxmind.com to geolocate IP/ addresses.
We don't accept notifications through email, IP address notifications, notifications with fake and/or created subdomains by notifier or with wrong attack methods selected.
We accept notifcation via our notify page Single notification / Mass notification with 10 maximum input url
User can submit notification as geust / or as member
URL
Full defaced URL. System will fetch HTML and store as
domain.com.html
plus Web Server, OS, IP, HTTP status. Severity (H / M / R / L) is calculated automatically.
URLs (up to 10)
Each non-empty line is processed as a separate OnHold submission with the same vulnerability and reason.
Codename / Defacer
This name will be shown in archive and mirror pages for this submission. Allowed: letters, numbers, "-" and "_" (no spaces).
Vulnerability
– Select vulnerability –
Access credentials through Man In the Middle attack
Attack against the administrator/user (password stealing/sniffing)
brute force attack
configuration / admin. mistake
Cross-Site Scripting
DNS attack through cache poisoning
DNS attack through social engineering
File Inclusion
FTP Server intrusion
known vulnerability (i.e. unpatched system)
Mail Server intrusion
Not available
Other Server intrusion
Other Web Application bug
Remote administrative panel access through bruteforcing
Remote administrative panel access through password guessing
Remote administrative panel access through social engineering
Remote service password bruteforce
Remote service password guessing
Rerouting after attacking the Firewall
Rerouting after attacking the Router
RPC Server intrusion
Shares misconfiguration
social engineering
SQL Injection
SSH Server intrusion
Telnet Server intrusion
undisclosed (new) vulnerability
URL Poisoning
Web Server external module intrusion
Web Server intrusion
Reason / Description
– Select reason –
Patriotism
Not available
As a challenge
Political reasons
Heh...just for fun!
Revenge against that website
I just want to be the best defacer
Submit to OnHold
Login
Register
Remaining guest submissions this session:
10
of 10.