ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

EXPLOITATION OF CONTENT MANAGEMENT SYSTEM VULNERABILITIES TO LAUNCH LARGE SCALE CYBER ATTACKS

Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 10)

Publication Date:

Authors : ; ;

Page : 1381-1395

Keywords : CMS; Exploitation; Cyber Attacks.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Content Management Systems are generally utilized for site advancement. Sites are the principle focuses of different pernicious aggressors, and in this way it is important to be learning about the security level of sites. This will depict a few highlights of the outstanding open source Content Management System stages: Drupal, WordPress and Joomla. The security of such web applications depends as much on vulnerabilities found in module as it does in vulnerabilities in the application center. One of the most serious issues confronting the IT security industry is the utilization of vulnerabilities in authentic programming to dispatch malware assaults. Noxious projects can utilize these vulnerabilities to taint a Content of Websites without drawing in the consideration of the client and now and again, without setting off an alarm from security programming. The digital assaults, or all the more particularly disavowal of administration assaults, were propelled by the Cyber warriors of Izz Ad-Din Al Qassam otherwise called Qassam Cyber Fighters. Operation Ababil was one of a progression of digital assaults beginning in 2012, focusing on different American money related establishments and completed by a gathering of Izz Ad-Din AlQassam.

Last modified: 2018-04-20 18:40:06