1 What's Local File Download(LFD)? - Local file download is kind of misconfigured web master or webdeveloper on php application. 2 Effect 2.1 Personal/website - You will able to view all php source code in plain text. - php source code is such as mysql connection data, eg: host, username, password and database 3 vulnerable source code - Example 1 <?php header("Content-type: application/octet-stream"); header("Content-disposition: attachment; filename=".$_GET['tbdsec']); echo file_get_contents($_GET['tbdsec']); ?> - Example 2 <?php $filename = $_GET['hmsec']; header("Pragma: public"); header("Expires: 0"); header("Cache-Control: must-revalidate, post-check=0, pre-check=0"); header("Content-Type: application/force-download"); header("Content-Type: application/octet-stream"); header("Content-Type: application/download"); header("Content-Disposition: attachment; filename=".basename($filename).";"); header("Content-Transfer-Encoding: binary"); header("Content-Length: ".filesize($filename)); @readfile($filename); exit(0); ?> 4 Proof of Concept - http://localhost/tbdsec.php?hmsec=configuration.php - Download it, and open it. - Walla! you able to all code in that page! 5 Patch code - To admin/webmaster ask your web developer fix it :D 6 Suggestion - Please don't you direct download, at least filter it. 7 Dork? - No DORK For Script Kiddies 8 Thanks/Credits - TDBSecurity(www.tbd.my<http://www.tbd.my>) - HMSecurity(www.hmsecurity.org<http://www.hmsecurity.org>) - Ahli Syurga Crew - XShimeX - Suhz - And Google :DAuthor: Ahlspiess
Local File Download Theory
December 29, 2009
0 Comments
Explore More
Dangerous IP’s – Do not scan
All the below are FBI controlled Linux servers & IPs/IP-Ranges 207.60.0.0 – 207.60.255.0 The Internet Access Company207.60.2.128 – 207.60.2.255 Abacus Technology207.60.3.0 – 207.60.3.127 Mass Electric Construction Co.207.60.3.128 – 207.60.3.255 Peabody
Keeping your wireless network secure
Here are a few steps to keep your AP secure.Remember nothing is unbreakable 1) Secure your wireless router or access point administration interface Almost all routers and access points have
Tracing a hacker
> Tracing a hacker > Written by: Paperghost [[email protected]] > 24/02/2005 Sometimes, it’s just not enough to simply know that there’s a Trojan or Virus onboard. Sometimes you need to