Friday, March 23, 2012

HACK WebSites RTE Webwiz Vulnerability - Remote File Upload Vulnerability

Hello Readers In this Tutorial i will tell you how to hack web sites with Rte Remote file upload 
Vulnerability.Rte Remote File Upload Vulnerability found in many sites.


I will show you how to hack a Remote File Upload Vulnerable websites. It is very easy and similar to other hacking attacks such as DNN (Dot Net Nuke ) attack. I will show you how to find your target and how to enter into the target website and upload your files.

What is Web Wiz Rich Text Editor (RTE) ?


Web Wiz Rich Text Editor (RTE) is a free WYSIWYG HTML Rich Text Editor that replaces standard textareas with an advanced Word style HTMLarea WYSIWYG Editor.
The Web Wiz Rich Text Editor allow users to easily layout the content being entered into your textareas with real-time formatting such as bold, italic, fonts, etc. You can even upload and resize images, tables, attach files, paste from Word, and many other tools. The resulting source code is then submitted like any other textarea.

Some easy Steps to Performing Attack.....

* First you find Vulnerable Website by using Google Dork.

   Go to  Google and type these Google Dorks.



Now you will see lots of websites. Pick anyone.


* Click on all images for large view.

Now you will see something like this:

Now We Can Upload Files From Our Computer. Press Browse and select your file and click Upload selected files.

We have Uploaded our ASP Shell. Now to navigate to our shell,


Shell Location: 


You Will Get This :

Now you can upload your html deface page here....

If you like this post then don’t forget  to share it and If you are getting any problem regarding to this feel free to comment :)

Connect With us on Facebook.

Written by

Hello, My name is Ankit Bhandari You can visit and Learn Ethical Hacking from my blog. But all these hacking tricks only for educational purpose. Me and My Blog will not responsible for any wrong use of this. Enjoy it but never miss use it.


Post a Comment


© 2014 Invisible Hackers. All rights Reserved. Designed by InvisibleHackers