Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 211 Vote(s) - 3.58 Average
  • 1
  • 2
  • 3
  • 4
  • 5
SSI Injection

#1
In this tutorial, I will write about SSI Injection hope you like it. =)


Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

-Wikipedia

Server-side Include Injection gives us the power to execute OS commands or include a restricted files contents the next time the page is served.

First, you need to find vulnerable site. =D
Here are some dorks:

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

Hope those are enough!

Time to test sites for vulnerability.

To find if the site is vulnerable, you should enter OS command.

Here are some example commands.

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Write one of those commands in text box, login/registration fields etc...

[Image: ssiy.jpg]

So when, you have find and test site for vulnerability its time to exploit it.
We are going to upload shell, you can download shells from my

[To see links please register here]

.
Ok, now you need .txt extension to your shell and you should upload it some where (hacked site, hosting...).
And, you should download it to the site who is vulnerable to SSI Injection. This is the command you should use.

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

So, if the text file is downloaded execute this command.

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

This coomand will show every file in the directory.
Now its time to change the extension to .php .

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

Now run listen command again.

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

And, your shell should be .php run it if every thing is OK, you have successful exploit the site.
Reply

#2
Nice tutorial. The grammar is decent as well.
Reply

#3
Hm, I always get forwarded to nsa.gov when i try to upload my shell, seems like this is not working anymore :/
Reply

#4
Quote:(11-09-2012, 12:47 PM)Oneiiros Wrote:

[To see links please register here]

Hm, I always get forwarded to nsa.gov when i try to upload my shell, seems like this is not working anymore :/

No idea, last time I exploit site with SSI Injection was before maybe year, I have try to exploit one site and I get into nsa.gov too, I will see what I can do.

Edit : Try attacking this site

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

, I haven't upload shell but i have try some commands and haven't redirect me to nsa.gov .
Reply

#5
Quote:The user:
[an error occurred while processing this directive]
[an error occurred while processing this directive], does not exist, please try again
Seems like this isn't working anymore, but still a good tutorial!
Reply

#6
Nice tutorial Synchro, you made it look easy!

~INST1NCT
Reply

#7
Nice tutorial, old method but it's useful
Reply

#8
Make sure you know what the target server is running. Apache SSI syntax is different from Nginx SSI syntax (and I think also different from Lighty).

EDIT: Quoting the whole OP is a bit obnoxious.

EDIT: Relevant documentation

Apache:

[To see links please register here]

Nginx:

[To see links please register here]

Lighty:

[To see links please register here]

Reply

#9
Quote:(11-09-2012, 09:34 PM)Nohbdy Wrote:

[To see links please register here]

Make sure you know what the target server is running. Apache SSI syntax is different from Nginx SSI syntax (and I think also different from Lighty).

EDIT: Quoting the whole OP is a bit obnoxious.

EDIT: Relevant documentation

Apache:

[To see links please register here]

Nginx:

[To see links please register here]

Lighty:

[To see links please register here]

Thanks, I love when somebody add something I forget
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through