Header Banner
Null Byte Logo
Null Byte
wonderhowto.mark.png
Cyber Weapons Lab Forum Metasploit Basics Facebook Hacks Password Cracking Top Wi-Fi Adapters Wi-Fi Hacking Linux Basics Mr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

Feb 11, 2015 07:12 PM
Feb 11, 2015 07:17 PM
A character with arms outstretched against a blue sky, featuring a skull emblem on their back and flames surrounding them.

Today, I want to share a tutorial on one of the most useful but old methods which you could use to hack websites, that is using the Dot net nuke (DNN) vulnerability . I know some of you already know about this method.

Note: This method only works if the website has the vulnerability.

Using the DNN vulnerability, One can hack all sites hosted on the server and also upload any file. It is an easy method as compared to other hacking attacks such as SQL Injection ( here ) and Cross Site Scripting ( Coming Soon ) etc.

Introduction

DotNetNuke is an open source platform for building web sites based on Microsoft .NET technology. DotNetNuke is mainly for the personal websites.

The Vulnerability in DNN Content Management System (CMS) allows a user to Upload a File/Shell Remotely without authentication A link for more Information regarding the vulnerability is here on exploitdb

Getting Started

Here we will be using Google Dork to track down sites running DNN (Dot Net Nuke) CMS and are vulnerable to Remote File Upload.

Let's begin folks ...

Navigate to google search and hit any of the dorks below

1. inurl:/tabid/36/language/en-US/Default.aspx

2. inurl:fcklinkgallery.aspx

3. inurl:/portals/0/

inurl: simply tells the bot ( Google's Bot ) to search url's with the text after it ( i.e the text after the inurl: )

You could also limit the search according to countries by adding site:

site: followed by a country's initial, ( Eg, in - India ) will search domains with those initials .

Screenshot of a Google search results page related to digital education and research.

After navigating to your chosen website ... We need to perform a little task: Replace: home/tabid/36/language/en-US/Default.aspx with Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx in the url and navigate to the page

Choosing The Correct WebSite

Not all websites running DNN CMS are vulnerable ...

A Website like this is not vulnerable ...

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

One like this is darmm vulnerable and we are good to go !

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

Making The Magic Happen !!!

Hit: Ctrl + Shift + K to drop your javascript browser terminal

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

Now select the 3rd radio button - File {A File On Your Site }

Our page should reload in most cases....

There are two ways here ... Execute Using The URL Bar or our javascript console ....

Type: javascript:_doPostBack('ctlURL$cmdUpload','') in the terminal box ...

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

Should our code be a success, The Page Will Reload and we should now have an upload button to upload our shells, images or what have we ...

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

Checking Upload Restrictions (If Any)

We can create a php shell and try to upload it ( Should The Upload Restrict Php Files, It will alert us ) . You can find how to generate a php shell or a back-connect file using weevely in Kali Linux here ...

Now let's Upload ...

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

Ooops!!! Php Files Denied .... Valid Files: ( . swf, .jpg, .jpeg, .jpe, .gif, .bmp, .png, .doc, .xls, .ppt, .pdf, .txt, .xml, .xsl, .css, .zip )

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

Well, I will cover how to bypass most file restrictions websites use in my upcoming tutorial's so be sure to stay tuned ...

Now let's create and upload a text file as it is accepted as a valid file...

Text File Name: null-byte_wonderhowto.txt

Text-based computer interface displaying menu options for a software application.

Save it ... ( Create any if u can't )

Time For Upload

Now back to the browser, Click The Upload Button Again And Select The Text File and click: Upload Selected File ... ( We shouldn't have any error as this stage )

File upload interface for a link gallery.

Accessing Uploaded Files

Now to access the uploaded file, We simply replace the whole url with

the website's domain address and append "/portals/0/" followed by our file name

> http://target.com//portals/0/uploaded_file_name_goes_here

So it's gonna be: http://site.com/portals/0/null-byte_wonderhowto.txt

......................................................................................................................

HIOB: WebSite Hacking Series Part 2: Hacking WebSites Using The DotNetNuke Vulnerability

As you can see: We successfully uploaded our null-byte file ...

I will find time to discuss bypassing website upload restriction.

Hope you had luck performing the tutorial and Have a nice day !!!

Please correct me for any misinformation or error you may find as well as comment if you don't understand anything. <Peace-Out>

#Sky

You already know how to use your phone. With Gadget Hacks' newsletter, we'll show you how to master it. Each week, we explore features, hidden tools, and advanced settings that give you more control over iOS and Android than most users even know exists.

Sign up for Gadget Hacks Weekly and start unlocking your phone's full potential.

Related Articles

Comments

No Comments Exist

Be the first, drop a comment!