Author Topic: Website Defacement  (Read 2608 times)

0 Members and 2 Guests are viewing this topic.

Offline Nortcele

  • Knight
  • **
  • Posts: 211
  • Cookies: -42
  • █+█=██
    • View Profile
Website Defacement
« on: January 17, 2015, 01:31:59 am »
Okay so just want to ask a simple question,


Can you guys name some of the methods you would go about defacing a site (if you had too?)


My website is pretty secure I'm sure, but just to be safe, there is no admin page, and it is not SQL Injection vulnerable...


What other things do I need to look out for?



~JaySec
~LulzBlog

TAKE A COOKIE!




0100000101010011010000110100100101001001

Offline Syntax990

  • Peasant
  • *
  • Posts: 129
  • Cookies: 77
  • Bruce Willis
    • View Profile
    • Evilzone "Hack"
Re: Website Defacement
« Reply #1 on: January 17, 2015, 01:43:58 am »
SQL Injection would be on the list, but since your asking:

  • XSS
  • Remote File Inclusion
  • Local File Inclusion
  • Exploiting vulnerabilities (Such as an outdated Adobe or Java applet)
All these methods are ways of possibly escalating privileges, but I cant do any of them :/

Offline Nortcele

  • Knight
  • **
  • Posts: 211
  • Cookies: -42
  • █+█=██
    • View Profile
Re: Website Defacement
« Reply #2 on: January 17, 2015, 02:01:39 am »
XSS isn't supported


Need to look at RFI and LFI


But thanks
~JaySec
~LulzBlog

TAKE A COOKIE!




0100000101010011010000110100100101001001

Offline shome

  • Peasant
  • *
  • Posts: 81
  • Cookies: 8
    • View Profile
Re: Website Defacement
« Reply #3 on: January 17, 2015, 06:35:30 am »
Okay so just want to ask a simple question,


Can you guys name some of the methods you would go about defacing a site (if you had too?)


My website is pretty secure I'm sure, but just to be safe, there is no admin page, and it is not SQL Injection vulnerable...


What other things do I need to look out for?

There are many different ways to answer this question.

Based on the information you've provided, I or the attacker would obviously want to look for some sort of listening service available besides apache, IIS God forbid, etc. I would first determine whether your web server is being hosted by a DNS or public domain, or by yourself on your own network, which i'm assuming is the case ?I would then look for zone transfers, do a dig, traceroute (all through proxychains, vpn), even nmap, and try to find a zombie to use as a decoy within your network, preferably a machine that wouldn't raise much suspicion in the logs, and pass as one of your own network devices. 

The goal as an attacker/defacer/skiddie etc. would be to root the machine through SSH, and edit the index.html file directly, but i'm just jabbering here. SQL Injection, web flaws would be my first go to. But since you claim it's not SQL injection vulnerable (what makes you so sure ?). In the case SSH isn't listening, then I would look into other listening services, or possibly looking for google dorks, sqlmap, etc.

 I would also be very interested what version of apache you're running, and how well you configured the .htaccess file, and try out some local and remote file inclusion vulnerabilities as syntax noted. How well the machine and / or the network is locked down in general would also be a question of mine.

Looking forward to other responses.
« Last Edit: January 17, 2015, 06:40:34 am by shome »

Offline z3ro

  • Knight
  • **
  • Posts: 345
  • Cookies: 60
    • View Profile
Re: Website Defacement
« Reply #4 on: January 17, 2015, 06:51:16 am »
Website defacement is lame.
~ God is real. Unless declared as an integer.

Offline M1lak0

  • Peasant
  • *
  • Posts: 129
  • Cookies: 10
    • View Profile
Re: Website Defacement
« Reply #5 on: January 17, 2015, 07:00:14 am »
I must give attention to this.
Okay here is some of the server based hacks I did in my early black hat days:
  • Symlink attack
  • cPanel BruteForcing
  • File Upload

If you are using some kind of cms like wp or joomla you can hacked easily if the attacker have access to any of the user on the server. For example:
I'm an attacker and you'r site is my target site I would hack any of the site on the server which can be hacked easily and then perform a symlink attack and gain access else would run  a cPanel cracker to crack your cPanel. See to these things. Even check for the proper filter of file uploads but less possibilities..

Also the image is just for fun! :D



To save your self you should have 2013 or + server hosting. Else patch it from the core if having vps.
Hope it helped.. :)
« Last Edit: January 17, 2015, 07:11:13 am by M1lak0 »
"Security is just an illusion"

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Website Defacement
« Reply #6 on: January 17, 2015, 08:01:22 am »
The title of this thread made me wanna move it to BoS, but members made it legit. +1 to errybody.

Offline Nortcele

  • Knight
  • **
  • Posts: 211
  • Cookies: -42
  • █+█=██
    • View Profile
Re: Website Defacement
« Reply #7 on: January 17, 2015, 09:41:39 am »
Thanks guys
~JaySec
~LulzBlog

TAKE A COOKIE!




0100000101010011010000110100100101001001

Offline queryFrequency

  • aka queerFrequency
  • Serf
  • *
  • Posts: 46
  • Cookies: -12
    • View Profile
Re: Website Defacement
« Reply #8 on: December 10, 2015, 03:51:57 am »
You have to first, obviously, rewrite the execution binary to gain centralized host access. Once you have access you need to program a c-sharp GUI interface to track the back end IP address so you can modify the XML packets to allow you to upload a malicious PHP file generated with Air Crack. Now, upload your handshake into the server. Now, once successfully hacked into the server. Upload your malicious esoteric deface page by replacing the /index.html. Duh...

Offline Architect

  • Sir
  • ***
  • Posts: 428
  • Cookies: 56
  • STFU
    • View Profile
    • Rootd IRC
Re: Website Defacement
« Reply #9 on: December 10, 2015, 09:25:08 am »
You have to first, obviously, rewrite the execution binary to gain centralized host access. Once you have access you need to program a c-sharp GUI interface to track the back end IP address so you can modify the XML packets to allow you to upload a malicious PHP file generated with Air Crack. Now, upload your handshake into the server. Now, once successfully hacked into the server. Upload your malicious esoteric deface page by replacing the /index.html. Duh...
Oh you mean..
$ echo "(;" > index.html

...Yes, this is a thing. Seriously though, who defaces sites anymore? It's always been about getting [root] shells for me.
« Last Edit: February 07, 2016, 05:11:15 pm by Architect »

Offline ShadowCloud

  • Serf
  • *
  • Posts: 33
  • Cookies: 31
  • -My word is my bond
    • View Profile
Re: Website Defacement
« Reply #10 on: December 10, 2015, 12:27:24 pm »
I must wonder why the primary concern here is web defacement?  Essentially the question asks for ways to obtain write access.  If I had write access, defacement would be the least of your concern. 

I used to do a lot of website hacking and I'd add an HTML comment and then submit the contact form, informing them of the breach and how I would recommend they prevent it.

It's an open ended question, sort of like asking how would you put water in a bucket?
QA Engineer walks into a bar. Orders a beer. Orders 0 beers. Orders 999999999 beers. Orders a lizard. Orders -1 beers. Orders a sfdeljknesv.

Offline m0rph

  • The People's Champ
  • VIP
  • Peasant
  • *
  • Posts: 50
  • Cookies: 44
  • Master Debator
    • View Profile
    • unkn0wn
Re: Website Defacement
« Reply #11 on: December 10, 2015, 12:51:19 pm »
XSS isn't supported
Actually, this is 100% false. XSS can, in fact, be used to deface a website (server-side if the method is stored, client-side if the method is reflected). Here are some ways XSS can be used like a pro:

-Reverse Shell On Server via XSS-
Code: [Select]
https://www.youtube.com/watch?v=B6QAjB3kYec

-Reverse Shell On Client via Reflective XSS-
Code: [Select]
https://vimeo.com/82779965

-XSS Being Used As A Worm-
Code: [Select]
https://www.youtube.com/watch?v=fcWb54gdWAo

-Stealing Online Sessions With XSS-
Code: [Select]
https://www.youtube.com/watch?v=-H1qjiwQldw

So on and so forth. Don't ever insinuate an attack is useless just because you don't understand how it works. That is a prime example of skid behavior. There is nothing wrong with being a noob. All of us were noobs at one point. There is no excuse for claiming an absolute false as being true when you don't even know the principle behind it. That is the definition of being an ignorant retard.
« Last Edit: December 10, 2015, 12:54:11 pm by m0rph »
The code is strong with this one.