Skip to content

Commit 5f244f4

Browse files
committed
Markdown Linting - Source Code, JWT, RMI, LDAP, LaTeX
1 parent d174593 commit 5f244f4

File tree

9 files changed

+151
-175
lines changed

9 files changed

+151
-175
lines changed

Diff for: Insecure Source Code Management/Bazaar.md

+2-3
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,19 @@
22

33
> Bazaar (also known as bzr ) is a free, distributed version control system (DVCS) that helps you track project history over time and collaborate seamlessly with others. Developed by Canonical, Bazaar emphasizes ease of use, a flexible workflow, and rich features to cater to both individual developers and large teams.
44
5-
65
## Summary
76

87
* [Tools](#tools)
98
* [rip-bzr.pl](#rip-bzrpl)
109
* [bzr_dumper](#bzr_dumper)
1110
* [References](#references)
1211

13-
1412
## Tools
1513

1614
### rip-bzr.pl
1715

1816
* [kost/dvcs-ripper/rip-bzr.pl](https://raw.githubusercontent.com/kost/dvcs-ripper/master/rip-bzr.pl)
17+
1918
```powershell
2019
docker run --rm -it -v /path/to/host/work:/work:rw k0st/alpine-dvcs-ripper rip-bzr.pl -v -u
2120
```
@@ -50,4 +49,4 @@ bzr revert
5049

5150
## References
5251

53-
- [STEM CTF Cyber Challenge 2019 – My First Blog - m3ssap0 / zuzzur3ll0n1 - March 2, 2019](https://ctftime.org/writeup/13380)
52+
* [STEM CTF Cyber Challenge 2019 – My First Blog - m3ssap0 / zuzzur3ll0n1 - March 2, 2019](https://ctftime.org/writeup/13380)

Diff for: Insecure Source Code Management/Mercurial.md

+2-4
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,22 @@
22

33
> Mercurial (also known as hg from the chemical symbol for mercury) is a distributed version control system (DVCS) designed for efficiency and scalability. Developed by Matt Mackall and first released in 2005, Mercurial is known for its speed, simplicity, and ability to handle large codebases.
44
5-
65
## Summary
76

87
* [Tools](#tools)
98
* [rip-hg.pl](#rip-hgpl)
109
* [References](#references)
1110

12-
1311
## Tools
1412

1513
### rip-hg.pl
1614

1715
* [kost/dvcs-ripper/master/rip-hg.pl](https://raw.githubusercontent.com/kost/dvcs-ripper/master/rip-hg.pl) - Rip web accessible (distributed) version control systems: SVN/GIT/HG...
16+
1817
```powershell
1918
docker run --rm -it -v /path/to/host/work:/work:rw k0st/alpine-dvcs-ripper rip-hg.pl -v -u
2019
```
2120
22-
2321
## References
2422
25-
* [my-chemical-romance - siunam - Feb 13, 2023](https://siunam321.github.io/ctf/LA-CTF-2023/Web/my-chemical-romance/)
23+
* [my-chemical-romance - siunam - Feb 13, 2023](https://siunam321.github.io/ctf/LA-CTF-2023/Web/my-chemical-romance/)

Diff for: Insecure Source Code Management/README.md

+10-15
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
# Insecure Source Code Management
22

3-
> Insecure Source Code Management (SCM) can lead to several critical vulnerabilities in web applications and services. Developers often rely on SCM systems like Git and Subversion (SVN) to manage their source code versions. However, poor security practices, such as leaving .git and .svn folders in production environments exposed to the internet, can pose significant risks.
4-
3+
> Insecure Source Code Management (SCM) can lead to several critical vulnerabilities in web applications and services. Developers often rely on SCM systems like Git and Subversion (SVN) to manage their source code versions. However, poor security practices, such as leaving .git and .svn folders in production environments exposed to the internet, can pose significant risks.
54
65
## Summary
76

@@ -13,21 +12,19 @@
1312
* [Labs](#labs)
1413
* [References](#references)
1514

16-
1715
## Methodology
1816

19-
Exposing the version control system folders on a web server can lead to severe security risks, including:
17+
Exposing the version control system folders on a web server can lead to severe security risks, including:
2018

21-
- **Source Code Leaks** : Attackers can download the entire source code repository, gaining access to the application's logic.
22-
- **Sensitive Information Exposure** : Embedded secrets, configuration files, and credentials might be present within the codebase.
23-
- **Commit History Exposure** : Attackers can view past changes, revealing sensitive information that might have been previously exposed and later mitigated.
24-
19+
* **Source Code Leaks** : Attackers can download the entire source code repository, gaining access to the application's logic.
20+
* **Sensitive Information Exposure** : Embedded secrets, configuration files, and credentials might be present within the codebase.
21+
* **Commit History Exposure** : Attackers can view past changes, revealing sensitive information that might have been previously exposed and later mitigated.
2522

26-
The first step is to gather information about the target application. This can be done using various web reconnaissance tools and techniques.
23+
The first step is to gather information about the target application. This can be done using various web reconnaissance tools and techniques.
2724

2825
* **Manual Inspection** : Check URLs manually by navigating to common SCM paths.
29-
* http://target.com/.git/
30-
* http://target.com/.svn/
26+
* Git: `http://target.com/.git/`
27+
* SVN: `http://target.com/.svn/`
3128

3229
* **Automated Tools** : Refer to the page related to the specific technology.
3330

@@ -41,14 +38,12 @@ location /.git {
4138
}
4239
```
4340

44-
For example in Git, the exploitation technique doesn't require to list the content of the `.git` folder (http://target.com/.git/), the data extraction can still be conducted when files can be read.
45-
41+
For example in Git, the exploitation technique doesn't require to list the content of the `.git` folder (`http://target.com/.git/`), the data extraction can still be conducted when files can be read.
4642

4743
## Labs
4844

4945
* [Root Me - Insecure Code Management](https://www.root-me.org/fr/Challenges/Web-Serveur/Insecure-Code-Management)
5046

51-
5247
## References
5348

54-
- [Hidden directories and files as a source of sensitive information about web application - Apr 30, 2017](https://github.com/bl4de/research/tree/master/hidden_directories_leaks)
49+
* [Hidden directories and files as a source of sensitive information about web application - Apr 30, 2017](https://github.com/bl4de/research/tree/master/hidden_directories_leaks)

Diff for: Insecure Source Code Management/Subversion.md

+7-5
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Subversion
22

3-
> Subversion (often abbreviated as SVN) is a centralized version control system (VCS) that has been widely used in the software development industry. Originally developed by CollabNet Inc. in 2000, Subversion was designed to be an improved version of CVS (Concurrent Versions System) and has since gained significant traction for its robustness and reliability.
3+
> Subversion (often abbreviated as SVN) is a centralized version control system (VCS) that has been widely used in the software development industry. Originally developed by CollabNet Inc. in 2000, Subversion was designed to be an improved version of CVS (Concurrent Versions System) and has since gained significant traction for its robustness and reliability.
44
55
## Summary
66

@@ -10,7 +10,8 @@
1010

1111
## Tools
1212

13-
* [anantshri/svn-extractor](https://github.com/anantshri/svn-extractor) - Simple script to extract all web resources by means of .SVN folder exposed over network.
13+
* [anantshri/svn-extractor](https://github.com/anantshri/svn-extractor) - Simple script to extract all web resources by means of .SVN folder exposed over network.
14+
1415
```powershell
1516
python svn-extractor.py --url "url with .svn available"
1617
```
@@ -21,11 +22,12 @@
2122
curl http://blog.domain.com/.svn/text-base/wp-config.php.svn-base
2223
```
2324

24-
1. Download the svn database from http://server/path_to_vulnerable_site/.svn/wc.db
25+
1. Download the svn database from `http://server/path_to_vulnerable_site/.svn/wc.db`
26+
2527
```powershell
2628
INSERT INTO "NODES" VALUES(1,'trunk/test.txt',0,'trunk',1,'trunk/test.txt',2,'normal',NULL,NULL,'file',X'2829',NULL,'$sha1$945a60e68acc693fcb74abadb588aac1a9135f62',NULL,2,1456056344886288,'bl4de',38,1456056261000000,NULL,NULL);
2729
```
28-
30+
2931
2. Download interesting files
3032
* remove `$sha1$` prefix
3133
* add `.svn-base` postfix
@@ -34,4 +36,4 @@ curl http://blog.domain.com/.svn/text-base/wp-config.php.svn-base
3436
3537
## References
3638
37-
- [SVN Extractor for Web Pentesters - Anant Shrivastava - March 26, 2013](http://blog.anantshri.info/svn-extractor-for-web-pentesters/)
39+
* [SVN Extractor for Web Pentesters - Anant Shrivastava - March 26, 2013](http://blog.anantshri.info/svn-extractor-for-web-pentesters/)

0 commit comments

Comments
 (0)