SMK Muhammadiyah 2 Palembang
Ctrlk
  • Introducation
  • The Basics
  • Windows
  • Scripting With Python
  • Recon and Information Gathering Phase
  • Vulnerability analysis
    • Server-side Vulnerabilities
    • HTTP - Web Vulnerabilities
      • Web-services
      • Common web-services
        • WAF - Web application firewall
          • WAF - Web application firewall
          • Attacking the System
          • Local File Inclusion (LFI)
          • Remote File Inclusion
          • Find hidden files and directories
          • SQL-injections
          • Nosql-injections
          • XML External Entity Attack
          • Bypass File Upload Filtering
          • Exposed Version Control
          • Failure to Restrict URL Access
    • Attacking the user
    • Exploiting
    • Post Exploitation
  • Password Cracking
  • Pivoting - Port forwarding - Tunneling
  • Network traffic
  • Wifi
  • Physical access to machine
  • Literature
Powered by GitBook
On this page
  1. Vulnerability analysis
  2. HTTP - Web Vulnerabilities
  3. Common web-services
  4. WAF - Web application firewall

Exposed Version Control

If you, using dirb or nikto, find version control file exposed, you can use it like this.

git clone http://example.com/.git

https://en.internetwache.org/dont-publicly-expose-git-or-how-we-downloaded-your-websites-sourcecode-an-analysis-of-alexas-1m-28-07-2015/

PreviousBypass File Upload FilteringNextFailure to Restrict URL Access

Last updated 3 years ago