This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
A hacker may use an exploit framework such as sqlmap to search for SQL vulnerabilities in the database and insert an Exploit kit such as MPack in order to compromise legitimate users who visit the now compromised web server. One of the simplest forms of page hijacking involves altering a webpage to contain a malicious IFrame which can allow an Exploit kit to load.
Page hijacking is frequently used in tandem with a Watering Hole attack on corporate entities in order to compromise targets.