Many hackers us Google dorks to locate servers vulnerable to RFI. Now let’s go through the steps a hacker would take to exploit this type of vulnerability in a website.ġ.First the hacker would find a website that gets its pages via the PHP include() function and is vulnerable to RFI. Although as of PHP 6.0, register_globals has been depreciated and removed, many websites still rely on older versions of PHP to run their webapplications. Many servers are vulnerable to this kind of attack because of PHP’s default settings of register_globals and allow_url_fopen being enabled. With this power the hacker can continue on to use local exploits to escalate his privileges and take over the whole system. Remote File Inclusion (RFI)occurs when a remote file, usually a shell(a graphical interface for browsing remote files and running your own code on a server), is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |