[Day 3] OSINT
December 3, 2022
Today I am reviewing OSINT techniques used for enumerating a website. Here is a recap of the day:
What is OSINT, and what techniques can extract useful information against a website or target?
Using dorks to find specific information on the Google search engine
Extracting hidden directories through the Robots.txt file
Domain owner information through WHOIS lookup
Searching data from hacked databases
Acquiring sensitive information from publicly available GitHub repositories
One powerful tool I have been learning about is Google Dorking and how much insecure data can be found just from a web crawler. Here is a great example of Google Dorking to find files in open directories.
intext:"chernobyl" intitle:"index.of" (wmv|mpg|avi|mp4|mkv|mov) -inurl:(jsp|pl|php|html|aspx|htm|cf|shtml)
I want to break this down a bit.
intext: In the text of a page the word is present
intitle: In the title of the page the word is present, included are the acceptable formats.
inurl: The url uses these formats when returning results.
Flags
Here is the website used to enumerate further and find flags: https://github.com/muhammadthm/SantaGiftShop
What is the name of the Registrar for the domain santagift.shop?
namecheap inc
Find the website's source code (repository) on github.com and open the file containing sensitive credentials. Can you find the flag?
{THM_OSINT_WORKS}
What is the name of the file containing passwords?
config.php
What is the name of the QA server associated with the website?
qa.santagift.shop
What is the DB_PASSWORD that is being reused between the QA and PROD environments?
S@nta2022
Last updated