PDA

View Full Version : Hacking With Shells



CardingMafia Admin
04-08-2013, 06:19 PM
I am very sure that many of you must have heard about various
attackers who deploy web shells to deface and disfigure websites.
But, do you actually know what are web shells and how to use them
in order to deface websites? Well, the main motive of this tutorial
is to make you all aware of the various ways to deface websites using
web shells. I know some of you may be thinking that I am just providing
script kiddiesh information, but let me tell you that the number of
queries I have received on this topic cannot be counted. That's why I am
doing full justice to all the wannabe-h4x0rs and script kiddies who are
craving to learn about these web shells and attacks associated with it.
So, just sit back and enjoy...


Web Shells
-------------------
A web shell is a script programmed in web application programming
languages like ASP, PHP etc. If the shell is executed on a particular
web server, the attacker can generate capricious commands. The shells
allows the attacker to delete, upload, replicate, create and alter files.
Web shells are popularly used by script kiddies, because it's somewhat
easy to execute on a specific web server. Mostly, web shells are executed
by manipulating the URL string. You don't expect the script kiddies to
mould an altered URL string! So, that's why they find RFI (Remote File
Inclusion) vulnerabilities to gather the obfuscated URL string that
enables them to upload the web shell on a web server remotely.


Hacking with Shells
--------------------
In the previous section, I have briefly explained the web shells. Now, in
this section, I am going to elucidate the technique to use such web shells
to deface websites. So, first and foremost, you need to have a web shell.
The commonly used web shells are c99, c66, r57 etc. Obtain a web shell from
you can search Google for “c99 shell”. After, obtaining
a web shell, search for web space. Actually, you require web space to upload
the web shell. You can get web space from AOL's Hometown or Free Web. After
acquiring a web space, upload your web shell as .txt (Text file). Now, you are
panoplied with web shell. Next, you need to find Remote File Inclusion (RFI)
vulnerabilities. You can get them from Security Bay's Exploit Den or milw0rm or
Security Focus or Packetstorm Security. In the RFI disclosure you will find
Obfuscated URL string that enables you to upload web shells remotely. An example
of a malformed URL would be http://www.anysite.com/nameofthecomp...php=evilscript.
Once you obtain the malformed URL, search for a website that is vulnerable to
the specific RFI. You can use Google to find websites that equates with the
vulnerability. Now, that you have a vulnerable website and web shell gear, what
would you do next. Just substitute the malformed URL string with the information
you have gathered and then execute it, in order to connect to the web server remotely
via web shells. If everything goes perfectly, then you will be redirected to the
web shell. In the web shell, you will get features and options to alter the web
server settings!


I need a live description
--------------------------
To make your work easier, let me give you an elucidated explanation of web shells. In
this section, I am actually going to show you how to deface a website using shells.
Please note that the site have been concealed for security reasons.
Say, I got a c99 shell, uploaded it in Searchezy.com. I also obtained
a Remote File Inclusion (RFI) vulnerability of a popular forum application. I also searched
Google for vulnerable websites. So, finally got all the things ready, like web shell, RFI
and vulnerable website. Next off, I execute the obfuscated URL string and find myself
in the web shell data screen. I wonder what should I do to please the readers. I suddenly
feel that I should get administrator privileges in the forum, which is vulnerable to the
RFI vulnerability. So, I quickly find the forum's config.php file and acquire the database
username and password. Now, in the c99 web shell I shoot the SQL Manager and provide the
database username and password. This redirects me to the SQL information of the forum. In
the SQL information tables, I find the user table. There, I search for my username and alter
it in such a manner that I get to sit in the administrator group. So, it's clear that once
I get to be in the administrator group, I am myself the administrator of the forum! Piece of
cake, ain't it?



Conclusion
--------------
Whew, justice done to all those who mass-mailed me for this tutorial. Though, there are many
other techniques associated with web shells. But, I guess you can figure out yourself.
I will get back to you as soon as possible. And, one more thing, these techniques are deployed by script kiddies, so I recommend you to try out high-end and sophisticated techniques like XSS or script injections to hack websites, not that I support defacement, just an advice. So, that pretty much concludes the tutorial on Hacking with Shells by Yours Truly. So, until next time ...Peace Out ...