How to identify security loopholes in a website that has been hacked to send spam?

Printable View