Jump to content
Wubi

Hacking Websites using Symlink Bypass

Recommended Posts



Description: This video is to demonstrate how a hacker can hack a shared server using a Symlink Bypass.
The attacking can read configuration on other users who are hosting on the same server as the compromised website.
First the attack needs to find a vulnerable website so he can get shell to the server to upload the symlinks bypass tool
From there the attack has to locate the other users on the same server and then try to figure out
where or if there is a configuration ex; wp-config.php
It will then open the config.php and save the inside of the config.php as a txt file.
From there the attacker would be able to access the victims SQL data base and change the information.

Files for this video can be found on ZARABYTE.COM
Please be sure to check out the forum if you need help.

Programs used:
  • Backtrack 5 RC2
  • Symlink Bypass user by zarabyte
  • MySQL Interface Shell
  • GNY Shell
  • ZaraByte File Uploader



Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Original Source:

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...