In this post we are going to search with Google, servers that have been compromised and they are hosting a webshell.
The most common method to upload a webshell to a server is RFI (Remote File Inclusion). RFI is a vulnerability that allows an attacker to upload a remote file like a script or webshell.
With a webshell, you can manage the server, read/create/remove files/upload files, execute commands on the remote server...
The common webshells are c99.php, c100.php, r57.php...
You can find servers hosting this webshells with the next google dorks
* Note that some links don't contain webshells because administrators have removed the shell from their servers or the webmaster are using black SEO.
inurl:"c99.php/" "uname -a"
inurl:"b374k.php/"
inurl:"c100.php" "uname -a"
inurl:r57.php
Subscribe to:
Post Comments (Atom)
About Me
Popular Posts
-
Some months ago, I participated in something like a "Hacker Competition" to get a job in a CERT. One of the tests consisted of g...
-
When we are involved in an incident handling and we are in charge of analyzing a traffic capture in a pcap format related to an attack, one...
-
In this post I'm going to talk about Volatility. Volatility is one of the best tools for memory forensics. It is an open source frame...
-
Introduction Wordpress is the CMS most used Worldwide. According to w3techs.com WordPress is used by 61.1% of all the websites whose con...
-
Assuming that time enough has happened since the security update was released by phpMyAdmin, we want to share our researches. As you alre...
Behind The Firewalls. Powered by Blogger.
0 comments:
Post a Comment