In this post we are going to search with Google, servers that have been compromised and they are hosting a webshell.
The most common method to upload a webshell to a server is RFI (Remote File Inclusion). RFI is a vulnerability that allows an attacker to upload a remote file like a script or webshell.
With a webshell, you can manage the server, read/create/remove files/upload files, execute commands on the remote server...
The common webshells are c99.php, c100.php, r57.php...
You can find servers hosting this webshells with the next google dorks
* Note that some links don't contain webshells because administrators have removed the shell from their servers or the webmaster are using black SEO.
inurl:"c99.php/" "uname -a"
inurl:"b374k.php/"
inurl:"c100.php" "uname -a"
inurl:r57.php
Subscribe to:
Post Comments (Atom)
About Me
Popular Posts
-
Some months ago, I participated in something like a "Hacker Competition" to get a job in a CERT. One of the tests consisted of g...
-
You already know that the malware developers create packed executables in order to try to thwart the security analyst job and make a ligh...
-
When we are involved in an incident handling and we are in charge of analyzing a traffic capture in a pcap format related to an attack, one...
-
Introduction Wordpress is the CMS most used Worldwide. According to w3techs.com WordPress is used by 61.1% of all the websites whose con...
-
Introduction Some months ago, I reported to the Fortinet PSIRT team two vulnerabilities which affect different Fortigate firmware version...
Behind The Firewalls. Powered by Blogger.
0 comments:
Post a Comment