Download a Collection of Deface Pages To Destroy a Website

on Minggu, 27 April 2014

Download a Collection of Deface Pages To Destroy a Website

Through the following post I am not purposing to influence you to start defacing, but to briefly give you a better understanding of how and why it is done.
Almost everyday I visit Zone-H’s archiveof special digital attacks, I find that at least 1 or 2 attacks were done against US governmental web servers. The domain suffix of the defaced websites was *.gov. Does this fact means that they are totally secure? I don’t think so… Obviously the web servers may host very confidential data. In this case the web server administrators seemed to have allowed threats against governmental assets. Any unwanted consequences that a breach of security can lead to, are mainly caused by the irresponsibility and lazyness of system administrators and web developers.
The methodology for defacing a website is pretty standard. Here is the standard sequence of tasks that normally the crackers/defacers would follow: Footprinting,scanning, enumeration, penetration, attack, covering of tracks and installation of backdoors. As I mentioned before, the motivations for defacing any website are various, whereas when defacing governmental websites, could be a promotion of an ideology, revenge, or just a challenge.
I don’t believe that people who are serial website defacers hold good real-life jobs, or any job at all. This is just my personal opinion which is based on the fact that defacing is illegal in most countries – thus involving a high risk of getting arrested - and requires some basic knowledge, time, and patience. Advanced knowledge of technical and theoretical network security issues is not always required to deface. I think that understanding IT security theories, enhances intelligently your logical application of related practicalities. Achieving a deface could require the application of a complex exploitation methodology. This is enough reason to give up for some defacers without patience and with incomplete knowledge.
Tools assisting each step mentioned in the last paragraph are widely available for free on the internet. Most of the authors coded them for ethical, legal and educational use. Of course some were specifically coded for easily generating domain lists, exploiting security vulnerabilities, and mass-defacing websites. These are not easy to find on the web, nor are that difficult to code. Instead, individual defacers and groups exchange them in IRC channels, private forums  and servers, and through instant messengers.
One example of such an IRC server is irc.gigachat.net.
Script kiddies who deface, prefer to use fancy GUIs for tools rather than command line. Command line tools seem to exceed their learning and memory capabilities, or they don’t have the will and patience to research and analyze effective methodologies used by professionals in netsec pen-testing. They would be more technically skilled and better exercise their brain to remember simple and complex command sequences in multi-OS environments. Plus they would develop their practical skill-set which may be necessary if they choose to follow an IT career at some point – if they don’t end up in jail.
Depending on their ethical and legal attitudes, usually what they want is to quickly accomplish breaking in a network, maybe lookup for confidential data, download them and deface the home pages of hosted sites. Always counting in exceptions, most probably they didn’t use their own exploits, but what was already public.
Now I’m going to quote from another of my posts the following:
“In the mind and soul of the crackers who deface high-profiled websites, there is a false sense of pride. They think that it reflects their cracking skills and status in the defacers scene. For them defacing is more like a game. The messages shown in their defacements are more like an excuse for taking part in this game. The real motivation and reasoning behind their attacks, in most of the cases is not political, patriotic or other; but is just to show off themselves and their country to the world…
They attach a nickname to their personalities and cracking abilities, and they try to raise its status in the scene. They like searching for their nicknames in news websites and showing off the link to other crackers in their IRC channel, other channels, or through their websites.”
You will be ignored if you request mentioned tools or help to deface a website. Comments are welcome of course. ;)
How to edit and save it… ??
All html codes are shared on pastebin, copy it and paste in notepad
then edit it and save as index.html or anyname.html
1- Tiger M@te’s Deface Page, 
This Deface page was uploaded on google bangladesh’d domain Google.com.bd
Live Demo : Download
2- Happy Birhthday Deface Page 
for making someone’s Birthday special =)
Live Demo : Download
3- Deface Page For Long Messages + Video 
Designed By Ffessxt Prince indishell
Live Demo : Download 
4- #opFreedom Plestine, 
Deface page with free palestine message, Designed by The Hackers army
Live Demo Download
5- Lovely deface Page for Your Girlfried or loved one 
This Deface Page was designed by me =)
Live Demo : Download
6-Deface Page with dancing firefox script
Live Demo : Download
7-Multi colour deface page
Live Demo : Download
8- Simple Black Deface Page 
Designed by Hax root
Live Demo : Download
9-Matrix Style Deface Page
Designed by ShOrTy420
Live Demo : Download
10-Pro Style Deface Page 
Live Demo : Download
9- Awesome  #opFreedom Plestine Page with New Fuctions
this page desgned by Syakila Daniel
Live Demo : Download
10- Awesme Matrix style Deface Page 
Designed by coded32
Live Demo : Download
11- Romantic deface Page with Roses
designed by Deepak  Carpenter
Live Demo : Download
12- Deface Page with Jquery 
Designed by Privatex
Live Demo : Download
13- #opmegaupload Deface Page
Live Demo : Download
14- A Progammer’s Deface Page with Love Letter
Designed by Me .. =)
Live Demo : Download

0 komentar:

Posting Komentar