GitHub Recon
MITRE ATT&CK™ Data from Information Repositories - Technique T1213
Last updated
MITRE ATT&CK™ Data from Information Repositories - Technique T1213
Last updated
Theory
Online repositories of code hold a window into an organization's technology stack, revealing the programming languages and frameworks they employ. In some rare instances, developers have unintentionally exposed sensitive information, including critical data and credentials, within public repositories. These inadvertent revelations may present a unique opportunity us.
To automate the process of searching sensitives files and hardcoded credentials in Git repositories, we may use following tools
Github-dorks is a python tools used to search leaked secrets via github search. Its collection of Github dorks can reveal sensitive personal and/or organizational information such as private keys, credentials, authentication tokens, etc.
Alternatively, we can manualy search for specific dorks, without using Github-dorks :
Examples of Github Dorks are :
Dork | Description |
---|---|
filename:.npmrc _auth | npm registry authentication data |
filename:.dockercfg auth | docker registry authentication data |
extension:pem private | private keys |
extension:ppk private | puttygen private keys |
filename:id_rsa or filename:id_dsa | private ssh keys |
filename:wp-config.php | wordpress config files |
filename:.env MAIL_HOST=smtp.gmail.com gmail | smtp configuration (try different smtp services too) |
shodan_api_key language:python | Shodan API keys (try other languages too) |
/"sk-[a-zA-Z0-9]{20,50}"/ language:Shell | Open AI API Keys |
"api_hash" "api_id" | Telegram API token |