Note: I'm currently taking a break from this course to focus on my studies so I can finally graduate
GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.
You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.
$ python githubcloner.py --org organization -o /tmp/outputBackup all of a users Github Gists with python Requests. Inspired by this.
Get code:
git clone https://gist.github.com/craig-m-unsw/59a1a0b1d6113637df1a41ab3d71ee64 gist-backups
cd gist-backups/
cat <<'EOF' >> .gitignoreCertified Information Systems Security Professional notes.
CISSP is a certification from the "International Information System Security Certification Consortium", more frequently known as (ISC)² (see https://www.isc2.org/Certifications/CCSP).
Index:
A quick lab, that works more or less (!!), to play with Ubuntu Landscape.
" Landscape is the leading management tool to deploy, monitor and manage your Ubuntu servers. "
A simple Packer + Vagrant install of Ubuntu 20.04 (Focal Fossa) LTS server for arm64, to run from my M1 Mac on Parallels Pro (17.1). Currently on MacOS Monterey.
Packer will run the ansible playbook.yml before the machine is shutdown and exported.
The installation is automated by cloud-init (which reads user-data). The file meta-data just needs to be an empty text file (you need to create this - no blank files or folders allowed in gists).
ubuntu2004/
Relearn some mySQL with Docker Compose, or maybe you feel nostalgia for phpMyAdmin.
Docs:
Situation:
- VPN (with 2FA) from your desktop
- SSH with SSO (username and password) into Linux system
- This is a HPC with many machines you want to SSH between without using any password
#!/bin/bash
set -x
set -e