InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Critical Security Findings at the University of Cambridge: A Methodology for Detecting Exposed Credentials

Abid Ahmad
InfoSec Write-ups
Published in
4 min readNov 6, 2024

--

Methodology

1. Initial Data Collection Using waymore

waymore -i cam.ac.uk -mode U -ko "\.(js|env|config|json|yaml|yml|conf|cnf|db|log)(\?|$)" -oU out.txt

2. Downloading Files Using FetchAllSrc

fas -i out.txt -o camjs

3. Running JSLeakRecon for Credential Detection

python3 jsleakrecon.py -f /path/to/camjs -o result-camjs.html

Finding 1: SCP Credentials Exposed in a `.json` File

Finding 2: MySQL Database Credentials Exposed in a `.yml` file

DB_MYSQL_HOST: "***.***.**.**"
DB_MYSQL_PORT: 3306
DB_MYSQL_USER: "*******"
DB_MYSQL_PASSWORD: "*********"
DB_MYSQL_NAME: "****"

Impact of the Vulnerabilities

Resolution and Responsible Disclosure

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

No responses yet