[Tutorial] Website Defacement!
by BrentWard - February 12, 2021 at 02:00 AM
Skript Kiddie Tutorial!

To deface websites there are a few ways to do it, first and most common way is by using an SQLi to bypass or uncover admin credentials to then login to the site as an admin. After that, you need to use  a local file inclusion vulnerability which allows for files such as .php extensions to be submitted to the site in the “add product page” (some sites only allow .jpg, .png, extensions so to bypass this you need to put shell.php.jpg, shell.jpg.php, shell.php.png and so on). After that you open the “image” (shell) in a separate tab (Right-click the uploaded image and click "copy link location", then paste the link in a separate tab) and then log into your shell, after that you select a directory such as index.html (index.html is commonly the home page to websites), copy and paste your .html source code into the respective field and then press “add defacement”, after this, you navigate to the home page and watch as the home page of the site has now been replaced with your .html page.

So are web defacement's targeted attacks? No, at least not most of the time, most of the time the individuals are using a technique called “Google Dorking” to locate vulnerable websites that align with their dork.

Example of Google Dorks:


As you can see the google dorks are looking for URLs that have “admin.aspx”, “Login”, “Admin panel”, etc in the URL. This tells Google to index websites with these URLs throwing back results to exposed administration panels. Most of the google dorks are outdated in terms of their design and security and a lot fall easy prey to sequel injections.

SQLi (Sequel injection) is used to bypass the login. Example of a SQLi payload is 1'or'1'='1. If one equals one, return the condition if true. So the next step is to perform a sequel injection into the login fields to bypass authentication. A SQL injection attack takes advantage of a vulnerability in a web application that allows hackers to modify the queries that are being executed on the underlying database. Web applications that directly execute user inputs as a query are those that fall prey to SQL injections. This allows attackers to execute malicious queries, also known as malicious payloads on databases. Error based SQLi is also commonly used to extract the admin credentials.

Local file inclusion and Remote file inclusion is used to upload a shell.php file to the web server.

Tool’s used to perform a website defacement:

Google Dork
SQLi payloads
LFI/RFI Vulnerabilities

Download Web Shells and Web Defacement Page from:

File.html: [https://anonfiles.com/V2KeF2Hbpa/DefacementPage_html].

php webshells: [https://anonfiles.com/jfQ4HfHdp9/php_shells_zip].

FIle inclusion vulnerabilities: [https://www.offensive-security.com/metas...abilities/].

Google Dork List: [https://github.com/BullsEye0/google_dork..._Dorks.txt].

Sqlmap: [https://github.com/sqlmapproject/sqlmap]. Learn how to perform SQLi: [https://www.w3schools.com/sql/sql_injection.asp].

You may also use Weevely to generate quick php back doors to shell servers. Weevely: [https://github.com/epinna/weevely3].

Enjoy :D!
Top 8 Basic Google Search Dorks [Live Examples]
June 11, 2019H4ck0Comments Offon Top 8 Basic Google Search Dorks [Live Examples]
Google is undisputedly the most important search engine in the world today. Google uses a sophisticated and proprietary algorithm for ranking websites that uses over 100 different criteria in the calculation, each of which is given a specific weighting which can change over time.

Google is clearly the best general-purpose search engine on the Web. Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at www.google.com/help/operators.html

Google allows the use of certain operators to help refine searches. The use of advanced operators is very simple as long as attention is given to the syntax. The basic format is:


Notice that there is no space between the operator, the colon and the search term. If a space is used after a colon, Google will display an error message. If a space is used before the colon, Google will use your intended operator as a search term.

This article will give you the maximum information about the Google Search Operators.

S.No. Operator Description Example
1 intitle: which finds strings in the title of a page intitle:”Your Text”
2 allintext: which finds all terms in the title of a page allintext:”Contact”
3 inurl: which finds strings in the URL of a page inurl:”news.php?id=”
4 site: which restricts a search to a particular site or domain site:yeahhub.com “Keyword”
5 filetype: which finds specific types of files (doc, pdf, mp3 etc) based on file extension filetype:pdf “Cryptography”
6 link: which searches for all links to a site or URL link:”example.com”
7 cache: which displays Google’s cached copy of a page cache:yeahhub.com
8 info: which displays summary information about a page info:www.example.com
Thanks for sharing practical teaching,

Possibly Related Threads…
Thread Author Replies Views Last Post
What coding language should i make a tutorial on? frost 6 749 December 11, 2018 at 02:20 PM
Last Post: tornic

 Users browsing this thread: 1 Guest(s)