Stealth Commanding

From Glitchdata
Jump to navigation Jump to search

This is the hijacking of a web server by the installation of unauthorized code. While the use of hidden forms may increase the risk of server compromise, the most common server exploits involve vulnerabilities of the server operating system or web server.