WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Check disks or mounted folders and we might be able to see the directories of the host system.
@@ -134,14 +139,18 @@ mount /dev/xvda1 /mnt/tmp
134
139
135
140
Now we can observe inside the `/mnt/tmp` directory.
136
141
137
-
<br />
142
+
## Gain Access to Mounted System
143
+
144
+
After mounting or found mounted folder, we can change root to the mounted folder:
145
+
146
+
```bash
147
+
chroot /mounted_folder bash
148
+
```
138
149
139
150
## Privilege Escalation to Root
140
151
141
152
Please see [Linux Privilege Escalation](/exploit/linux/privilege-escalation/).
142
153
143
-
<br />
144
-
145
154
## Run Vulnerable Docker Image
146
155
147
156
According to [Hacktricks](https://book.hacktricks.xyz/network-services-pentesting/2375-pentesting-docker#compromising), we can escape a docker container with the vulnerable image.
After that you invaded the docker container, you might be able to make it persistence while evading the IDS alerts by creating a docker compose file and abusing the entrypoint option to grant you a reverse shell.
@@ -257,8 +258,6 @@ Now run the docker compose in remote machine. You should gain a shell.
257
258
docker-compose run
258
259
```
259
260
260
-
<br />
261
-
262
261
## Amazon Elastic Container Registry (ECR) Public Gallery
Copy file name to clipboardExpand all lines: src/exploit/container/kubernetes/index.md
+36-11Lines changed: 36 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,10 @@
2
2
title: Kubernetes Pentesting
3
3
description: A portable, extensible, open source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. Default ports are 6443, 8443.
Copy file name to clipboardExpand all lines: src/exploit/web/dump-git-repository-from-website.md
+9-20Lines changed: 9 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,13 @@ description: If we can have permission to access git repositoy in target website
4
4
tags:
5
5
- Web
6
6
refs:
7
-
date: 2025-02-27
7
+
date: 2025-03-17
8
8
draft: false
9
9
---
10
10
11
-
## Dumping with Git-Dumper
11
+
## Dumping
12
+
13
+
### Method 1. Git-Dumper
12
14
13
15
[git-dumper](https://github.com/arthaud/git-dumper) is an useful Python package.
14
16
@@ -17,24 +19,7 @@ pipx install git-dumper
17
19
git-dumper https://example.com/.git ./dumped
18
20
```
19
21
20
-
<br />
21
-
22
-
## Dumping with Wget
23
-
24
-
We can simply use **`wget`** command in Linux to download the git repository.
25
-
After that, we can investigate files or all histories.
26
-
27
-
```bash
28
-
# -r: Recursive
29
-
wget -r https://example.com/.git/
30
-
cd example.com
31
-
git log --stat
32
-
git checkout <commit_id>
33
-
```
34
-
35
-
<br />
36
-
37
-
## Dumping with gitdumper and extracter
22
+
### Method 2. GitTools
38
23
39
24
[GitTools](https://github.com/internetwache/GitTools) downloads Git repository of the web application.
40
25
To dump the repository, execute the following commands.
@@ -56,3 +41,7 @@ chmod +x extractor.sh
56
41
57
42
Now we retrieve the entire git project from website.
58
43
It is stored in **“./new_example”** folder. We can investigate the repository.
44
+
45
+
## After Dumping…
46
+
47
+
If we succeed in dumping, we can investigate the repository with `git` command and get sensitive information. See [Git GitHub Pentesting](https://exploit-notes.hdks.org/exploit/version-control/git/git-github-pentesting/).
0 commit comments