{"id":104,"date":"2008-02-04T19:40:40","date_gmt":"2008-02-05T03:40:40","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/04\/website-defacing-example\/"},"modified":"2008-02-04T19:49:10","modified_gmt":"2008-02-05T03:49:10","slug":"website-defacing-example","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/04\/website-defacing-example\/","title":{"rendered":"Website Defacing Example"},"content":{"rendered":"<p>A while ago I wrote a post about having stumbled across a site on the uwnews domain that had been attacked.  Yoshi reported the problem after determining it to be genuine and uwnews fixed the problem promptly.  At the time, I took a <a href=\"http:\/\/huskydev.homelinux.net\/hacked.jpg\">snapshot <\/a>of what the hacked site looked like and wanted to share it here for the curious.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A while ago I wrote a post about having stumbled across a site on the uwnews domain that had been attacked. Yoshi reported the problem after determining it to be genuine and uwnews fixed the problem promptly. At the time, &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/04\/website-defacing-example\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-104","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=104"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/104\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}