Remote file inclusion is
basically a one of the most common vulnerability found in web application. This
type of vulnerability allows the Hacker or attacker to add a remote file on the
web server. If the attacker gets successful in performing the attack
he/she will gain access to the web server and hence can execute any command on
it.
Searching
the Vulnerability
Remote File inclusion vulnerability
is usually occured in those sites which have a navigation similar to the below
one
To find
the vulnerability the hacker will most commonly use the
following Google Dork
“inurl:index.php?page=”
This will show all the pages which has “index.php?page=”
in their URL, Now to test whether the website is vulnerable to Remote file
Inclusion or not the hacker use the following command
Lets say that the target website is http://www.cbspk.com
So the hacker url will become
If after executing the command the
homepage of the google shows up then then the website is vulnerable to this
attack if it does not come up then you should look for a new target. In my case
after executing the above command in the address bar Google homepage shows up
indicating that the website is vulnerable to this attack
Now the hacker would upload the shells to
gain access. The most common shells used are c99 shell or r57 shell. I
would use c99 shell. You can download c99 shell from the link below:
The hacker would first upload the shells to a
webhosting site such as ripway.com, 110mb.com etc.
Now here is how a hacker would execute the shells
to gain access. Lets say that the url of the shell is
Now here is how a hacker would execute the
following command to gain access
Remember to add “?” at the end of url or else the
shell will not execute. Now the hacker is inside the website and he could do
anything with it...
No comments:
Post a Comment