This article needs attention from an expert in Internet. Please add a reason or a talk parameter to this template to explain the issue with the article. WikiProject Internet (or its Portal) may be able to help recruit an expert.(May 2015)
A Hacker may use an exploit framework such as sqlmap to search for SQLvulnerabilities in the database and insert an Exploit kit such as MPack in order to compromise legitimate users who visit the now compromised web server. One of the simplest forms of page hijacking involves altering a webpage to contain a malicious IFrame which can allow an Exploit kit to load.
Page hijacking is frequently used in tandem with a Watering Hole attack on corporate entities in order to compromise targets.