h4cker_b00k
  • Whoami
  • ARTIUCLOS
    • Tratamiento para la TTY
    • Permisos SUID
    • Honeypot
    • File2ban Privilege Escalation
    • Reversing Shell's (Creación)
    • Pfsense Firewall Configuración GUIA
    • EternalBlue Conf y Explotación
    • BlueKeep Conf y Explotación
    • Pass-The-Hash en Metasploit
    • Keylogger Automatizado
    • Visualizar Webcam en Windows
    • Kernel Conf Exploit
    • RevrseShell Oculta en windows
    • Crear CTF en Docker
    • Crear Dominio y Subdominio en apache2
    • Sticky Keys Hack
    • Bypass Login Linux (GRUB)
    • WOL (Wake On Lan) Conf
    • Shell Persistente PowerShell
    • Remcos (Técnica RAT)
    • Entorno virtual Anaconda/Miniconda Python
    • CVE-2024-10924 (Bypass-MFA-Wordpress)
    • CVE-2024-21413 (Outlook)
    • CVE-2023-32784 (Keepass-password-dump)
    • FTP vsftpd-2.3.4 backdoor
    • Activación de Office Permanente
    • Instalar SPSS (crack)
    • Servidor Node.js en Windows
    • Establecer Banner de entrada Ubuntu Server
    • Configuración de VLANs en Switch (PuTTY)
    • Crear Entorno Vulnerable en Nube Local (Docker)
  • Linux
    • Determinar S.O. (Victima)
  • Windows
    • Comandos Windows S.0.
    • Bypass UAC (Windows)
  • HERRAMIENTAS/TÉCNICAS
    • HackingWeb
      • SQL Injection
      • XSS (Cross Site Scripting)
      • NoSQL Injection
      • XXE Injection
      • Serialización/Deserialización
        • Deserialización Insegura Java (LAB)
        • Deserialización Insegura (PHP, Python y Java)
        • Deserialización Insegura PHP
        • Deserialización Insegura Python
      • Vulnerabilidad Open Redirect
      • XEE (XML External Entity Injection)
      • SSTI (Server-Side Template Injection)
      • Prototype Pollution (Contaminación de prototipos) JavaScript
      • IDOR (Insecure Direct Object Reference)
      • CORS (Cross-Origin Resource Sharing)
        • PortSwigger - CORS vulnerability with basic origin reflection
      • CSRF (Cross-Site Request Forgery)
    • Ingeniería Inversa
      • Radare2
    • Reconocimiento
      • NMAP
      • Dominios/Subdominios
      • Fuzzing
      • Crackmapexec
    • Explotación
      • LFI (Local File Inclusion)
      • Evil-winrm
      • Serealizacion/Deserealizacion
      • Poetry
    • Post-Explotación
      • Port Forwarding
      • A.D. Group Server Operators
      • Decrypt Firefox
    • Criptología
      • Openssl bruteforce script
    • Phishing
      • Phishing - Tools
      • Phishing Técnicas y Resultados
    • BadUSB
      • Digispark/USB Ninja (Función)
      • Digispark (Script)
      • Lista de signos Digispark
      • Bash Bunny
      • ScreenCrab
      • KeyCroc
      • Rubber Ducky
      • USB AutoRun
    • Hacking ActiveDirectory
      • KERBEROASTING Active Directory
      • Active Directory Hacking (Practicas-Teoria)
      • Active Directory Hacking (Auditorias entorno real)
    • DOXEO
      • BoxPiper Pagina Doxeo
      • Epieos Pagina Doxeo
      • Exposed Pagina Doxeo (Correo, numero, etc...)
      • GitHub Para Doxear
      • Hunter Pagina Doxeo
      • IntelligenceX Pagina Doxeo
      • OSINT Industries Pagina Doxeo (Correo, numero, etc...)
      • Phomber GitHub (Doxeo Numero de Teléfono)
      • Temp Mail Pagina Correos Temporales
    • Hacking Wifi
      • Reaver
      • Aircrack-ng (Practica)
    • BOF
      • Introducción
      • ret2win
      • Secuencias de De Bruijn
      • Shellcode
      • NOPs
      • 32-bit vs 64-bit
      • No eXecute (NX)
      • Programación Orientada al Retorno (ROP)
      • Error de Cadena de Formato
      • Stack Canaries
      • Ejecutables Independientes de Posición (PIE)
      • Aleatorización del Espacio de Direcciones (ASLR)
      • Sobrescritura de la Tabla de Desplazamiento Global (GOT)
      • RELRO (Relocation Read-Only)
      • Shellcode Confiable
      • One Gadgets y Malloc Hook
      • Syscalls (Llamadas al Sistema)
      • ret2dlresolve
      • ret2csu
      • Explotación a Través de Sockets
      • Creación de Procesos: fork
      • Stack Pivoting
  • CTF
    • VulnHub
      • Basic_Pentesting_1 VulnHub
      • Basic_Pentesting2 VulbHub
      • Corrosion2 VulnHub
      • BassamCTF VulnHub
      • BORN2ROOT_2 VulnHub
      • CengBox VulnHub
      • Chill_hack VulnHub
      • CK-00 VulnHub
      • Clover_1 VulnHub
      • Cofeeaddicts VulnHub
      • Connect-The-Dots VulnHub
      • djinn_2 VulnHub
      • driftingblues_7 VulnHub
      • doubletrouble VulnHub
      • Dripping_blues VulnHub
      • Durian VulnHub
      • Election VulnHub
      • Empire Lupin One VulnHub
      • EVILBOX_ONE VulnHub
      • Funbox_Lunchbreaker VulnHub
      • Gaara VulnHub
      • Gigachad_vh VulnHub
      • HACK ME PLEASE VulnHub
      • HACKATHONCTF2 VulnHub
      • Hackeable ll VulnHub
      • Hacksudo_Aliens VulnHub
      • Ica1 VulnHub
      • Jangow VulnHub
      • Jetty VulnHub
      • LiterallyVulnerable VulnHub
      • Masashi VulnHub
      • MINU_1 VulnHub
      • Momentum VulnHub
      • MoneyBox VulnHub
      • Monitoring VulnHub
      • Noob VulnHub
      • Odin VulnHub
      • Photographer VulnHub
      • Prime_2 VulnHub
      • PYLINGTON VulnHub
      • RootThis_1 VulnHub
      • Seppuku VulnHub
      • shenron-3 VulnHub
      • Shuriken_1 VulnHub
      • So_simple_1 VulnHub
      • Stapler VulnHub
      • Sumo VulnHub
      • SUNSET_DUSK VulnHub
      • Symfonos_1 VulnHub
      • System_failure VulnHub
      • Thales VulnHub
      • THOTH_TECH_1 VulnHub
      • unknowndevice64 VulnHub
      • Vikings VulnHub
      • ColddBoxEasy_EN VulnHub
      • KB-VULN3 VulnHub
      • Funbox_CTF_4 VulnHub
      • NASEF_1 LOCATING TARGET VulnHub
      • NiveK VulnHub
    • HackTheBox
      • Usage HackTheBox
      • Perfection HackTheBox
      • Headless HackTheBox
      • Editorial HackTheBox
      • Builder HackTheBox
      • BoardLight HackTheBox
      • Bizness HackTheBox
      • Chemistry HackTheBox
      • Titanic HackTheBox
    • TryHackMe
      • RootMe TryHackMe
      • Bounty Hacker TryHackMe
      • Mr Robot CTF TryHackMe
      • Creative TryHackMe
    • Dockerlabs
      • AaguaDeMayo DockerLabs (Easy)
      • Asucar DockerLabs (Intermediate)
      • Bashpariencias DockerLabs (Intermediate)
      • Chocolatefire DockerLabs (Intermediate)
      • Collections DockerLabs (Intermediate)
      • Skullnet Dockerlabs (Difícil)
      • Mirame DockerLabs (Easy)
      • Buscalove DockerLabs (Easy)
      • Hidden DockerLabs (Intermediate)
      • Hackpenguin DockerLabs (Intermediate)
      • Fileception DockerLabs (Intermediate)
      • Domain DockerLabs (Intermediate)
      • ChatMe DockerLabs (Intermediate)
      • Devil DockerLabs (Intermediate)
      • Usersearch DockerLabs (intermediate)
      • Insecure DockerLabs (Hard)
      • Debugme DockerLabs (Hard)
      • Forgotten_portal DockerLabs (Intermediate)
      • Elevator DockerLabs (Easy)
      • Stack DockerLabs (Intermediate)
      • Hedgehog DockerLabs (Very Easy)
      • Report DockerLabs (intermediate)
      • Reverse DockerLabs (intermediate)
      • Reflection DockerLabs (Easy)
      • Spain DockerLabs (Hard)
      • Raas DockerLabs (Hard)
      • Database DockerLabs (Intermediate)
      • DevTools DockerLabs (intermediate)
      • Dockerlabs DockerLabs (Easy)
      • PyRed DockerLabs (Intermediate)
      • SecretJenkins DockerLabs (Easy)
      • Backend DockerLabs (Easy)
      • Eclipse DockerLabs (intermediate)
      • Cachopo DockerLabs (Intermediate)
      • Fooding DockerLabs (Intermediate)
      • Extraviado DockerLabs (Easy)
      • DockHackLab DockerLabs (Intermediate)
      • SummerVibes DockerLabs (Hard)
      • WalkingCMS DockerLabs (Easy)
      • Patriaquerida DockerLabs (Easy)
      • Psycho DockerLabs (Easy)
      • Picadilly DockerLabs (Easy)
      • Anonymouspingu DockerLabs (Easy)
      • Veneno DockerLabs (Intermediate)
      • DoubleTrouble DockerLabs (Hard)
      • FindYouStyle DockerLabs (Easy)
      • Move DockerLabs (Easy)
      • Los 40 Ladrones DockerLabs (Easy)
      • Library DockerLabs (Easy)
      • NorC DockerLabs (Hard)
      • Predictable DockerLabs (Hard)
      • Winterfell DockerLabs (Easy)
      • Pntopntobarra DockerLabs (Easy)
      • ConsoleLog DockerLabs (Easy)
      • Queuemedic DockerLabs (Hard)
      • Stranger DockerLabs (Intermediate)
      • WhereIsMyWebShell DockerLabs (Easy)
      • Insanity DockerLabs (Hard)
      • NodeClimb DockerLabs (Easy)
      • MyBB DockerLabs (Intermediate)
      • Seeker DockerLabs (Intermediate)
      • sjd DockerLabs (Very Easy)
      • Hiddencat DockerLabs (Easy)
      • Verdejo DockerLabs (Easy)
      • ChocolateLovers DockerLabs (Easy)
      • Pinguinazo DockerLabs (Easy)
      • Vendetta DockerLabs (Easy)
      • Pequenas-mentirosas DockerLabs (Easy)
      • Balulero DockerLabs (Easy)
      • Whoiam DockerLabs (Easy)
      • Apolos DockerLabs (Intermediate)
      • Injection DockerLabs (Very Easy)
      • Unrecover DockerLabs (Intermediate)
      • Trust DockerLabs (Very Easy)
      • Firsthacking DockerLabs (Very Easy)
      • BreakMySSH DockerLabs (Very Easy)
      • Borazuwarahctf DockerLabs (Very Easy)
      • Vacaciones DockerLabs (Very Easy)
      • Obsession DockerLabs (Very Easy)
      • Swiss DockerLabs (Intermediate)
      • Internship DockerLabs (Easy)
      • Canario DockerLabs (Hard)
      • ApiRoot DockerLabs (Intermediate)
      • Amor DockerLabs (Easy)
      • Walking Dead DockerLabs (Easy)
      • Master DockerLabs (Intermediate)
      • StrongJenkins DockerLabs (Intermediate)
      • PingPong DockerLabs (Intermediate)
      • Allien DockerLabs (Easy)
      • Paradise DockerLabs (Easy)
      • ApiBase DockerLabs (Easy)
      • Smashing DockerLabs (Hard)
      • Rubiks DockerLabs (Intermediate)
      • Inclusion DockerLabs (Intermediate)
      • Sites DockerLabs (Intermediate)
      • Upload DockerLabs (Easy)
      • ShowTime DockerLabs (Easy)
      • MachuPicchu DockerLabs (Intermediate)
      • ChocoPing DockerLabs (Intermediate)
      • Crystalteam DockerLabs (Intermediate)
      • Balufood DockerLabs (Easy)
      • Bicho DockerLabs (Easy)
      • Gallery DockerLabs (Hard)
      • Ciberguard DockerLabs (Intermediate)
      • Galeria DockerLabs (Easy)
      • TheDog DockerLabs (Intermediate)
    • BugBountyLabs
      • Reflection BugBountyLabs (Principiante)
      • Escape BugBountyLabs (Principiante)
      • DogShow BugBountyLabs (Avanzado)
      • Trr0rlabs BugBountyLabs (Avanzado)
      • XSSaS BugBountyLabs (Experto)
      • Redirection BugBountyLabs (Principiante)
      • HiddenRedirection BugBountyLabs (Principiante)
      • Corsy BugBountyLabs (Avanzado)
      • Forgery BugBountyLabs (Principiante)
      • ConnectX BugBountyLabs (Principiante)
      • NeoMarket BugBountyLabs (Avanzado)
      • Access BugBountyLabs (Principiante)
      • Listing BugBountyLabs (Principiante)
    • TheHackersLabs
      • Quokka (Windows) TheHackersLabs (Principiante)
      • Microchoft (Windows) TheHackersLabs (Principiante)
      • Ensalá Papas (Windows) TheHackersLabs (Principiante)
      • Accounting (Windows) TheHackersLabs (Principiante)
      • Cocido Andaluz (Windows) TheHackersLabs (Principiante)
      • Espeto Malagueño (Windows) TheHackersLabs (Principiante)
    • HackMyVM
      • Liar HackMyVM (Easy - Windows)
      • Zero HackMyVM (Easy - Windows)
      • Simple HackMyVM (Easy - Windows)
      • TriplAdvisor HackMyVM (Easy - Windows)
      • Runas HackMyVM (Easy - Windows)
      • Always HackMyVM (Easy - Windows)
      • DC01 HackMyVM (Easy - Windows)
      • quoted HackMyVM (Easy - Windows)
      • Nessus HackMyVM (Easy - Windows)
      • Jan HackMyVM (Easy - Linux)
      • DC02 HackMyVM (Intermediate - Windows)
      • Qweasd HackMyVM (Intermediate - Linux)
      • Gift HackMyVM (Easy - Linux)
      • Pingme HackMyVM (Intermediate - Linux)
      • Smol HackMyVM (Intermediate - Linux)
      • Noob HackMyVM (Easy- Linux)
      • Pingme HackMyVM (Intermediate - Linux)
      • Hundred HackMyVM (Intermediate - Linux)
      • Driftingblues6 HackMyVM (Easy- Linux)
      • Alzheimer HackMyVM (Easy- Linux)
      • Tron HackMyVM (Easy- Linux)
      • Superhuman HackMyVM (Easy- Linux)
      • Ripper HackMyVM (Easy- Linux)
      • Gigachard HackMyVM (Easy- Linux)
      • Hidden HackMyVM (Easy- Linux)
      • Method HackMyVM (Easy- Linux)
      • Hostname HackMyVM (Easy- Linux)
      • BaseME HackMyVM (Easy- Linux)
      • May HackMyVM (Intermediate - Linux)
      • Driftingblues3 HackMyVM (Easy- Linux)
      • hommie HackMyVM (Easy- Linux)
      • forbidden HackMyVM (Intermediate- Linux)
      • t800 HackMyVM (Easy - Linux)
      • Twisted HackMyVM (Easy- Linux)
      • Connection HackMyVM (Easy - Linux)
      • Flower HackMyVM (Easy- Linux)
      • Helium HackMyVM (Easy- Linux)
      • Suidy HackMyVM (Intermediate - Linux)
      • WebMaster HackMyVM (Easy - Linux)
      • Locker HackMyVM (Easy - Linux)
      • Soul HackMyVM (Hard - Linux)
      • Visions HackMyVM (Easy - Linux)
      • Friendly3 HackMyVM (Easy - Linux)
      • Friendly HackMyVM (Easy - Linux)
      • Friendly2 HackMyVM (Easy - Linux)
      • Comingsoon HackMyVM (Easy - Linux)
      • SuidyRevenge HackMyVM (Hard - Linux)
      • Insomnia HackMyVM (Easy - Linux)
      • Uvalde HackMyVM (Easy - Linux)
      • System HackMyVM (Easy - Linux)
    • CTF's
      • CTF Avengers Easy
      • CTF Ciberhack Intermediate
      • Ghost CTF Hard
      • CTF Cyb3rSh1€ld Intermediate
      • CTF HackMeDaddy Hard
      • CTF inj3ct0rs Intermediate
      • CTF LFI.elf Easy
      • CTF Ctrl-X Easy
      • CTF r00tless Hard
      • CTF 0xc0ffee Intermediate
      • CTF Memesploit Intermediate
      • CTF Jenkhack Easy
      • CTF chmod-4755 Intermediate
      • CTF 404-not-found Easy
      • CTF dance-samba Intermediate
      • CTF VulnVault Intermediate
      • CTF CrackOff Hard
      • CTF PressEnter Easy
      • CTF Mapache2 Intermediate
      • CTF Hackzones Intermediate
      • CTF Darkweb Hard
      • CTF Flow Hard
      • CTF Sender Intermediate
      • CTF Cracker Intermediate
      • CTF Express Intermediate
      • CTF CineHack Intermediate
      • CTF LifeOrDead Hard
      • CTF TpRoot Very Easy
      • CTF Gitea Intermediate
      • CTF SecureLAB Hard
      • CTF Goodness Easy
      • CTF LogisticCloud Intermediate
  • Conceptos de Ciberseguridad en Hacking Ético
    • Contenido...
      • Teoría Hacking Ético
        • Introducción
      • Recopilación Pasiva de información
        • Introducción
        • Hacking con buscadores de internet
        • Pagina Shodan
        • Pagina Censys
        • Registros o BBDD Whois
        • Archive (Análisis de información histórica)
        • TheHarvester
          • TheHarvester Herramienta
          • Bloqueo temporal de dirección IP pública
        • Maltego
          • Instalacion de maltego en kali linux
          • Funcionamiento de Maltego
          • Instalar transformador con API Key
          • Utilizar transformador shodan en maltego
        • Recon-ng Herramienta
      • Recopilación Semi-Pasiva de información
        • Introducción
        • Entorno controlado (LAB)
        • FOCA (Análisis de metadatos)
          • Introducción FOCA
          • Instalar FOCA
          • Funciones de FOCA
        • Herramientas alternativas para Kali de extracción de metadatos
          • Herramienta Metagoofil
          • Herramienta Metashield-analyzer
        • Introducción al protocolo DNS
        • CentralOps y DNSdumpster
          • CentralOps
          • DNSdumpster
        • Sniffers
          • Wireshark
          • TCPdump
      • Recopilación Activa de información
        • Introducción
        • Metasploitable3
          • Entorno vulnerable (Metasploitable3 (Presentación))
          • Instalacion de Metasploitable3
          • Linux Ubuntu-Windows Server 2008 - Metasploitable3
        • DNSRecon Herramienta (Ficheros de zona)
        • Nmap Herramienta
          • Introducción
          • Descubrimiento de hosts (Host Discovery)
          • Escaneo de puertos
          • Descubrimiento de servicios
          • Amap (descubrimiento de servicios)
          • Nmap (identificación del sistema operativo)
          • Nmap (SMB Enumeration)
          • Nmap (SNMP enumeration)
      • Análisis de vulnerabilidades
        • Introducción
        • CVE, CVSS, CPE - Common Vulnerabilities and Exposures
        • Análisis de vulnerabilidades con Nmap
        • Nessus Herramienta (Mas utilizada)
          • Instalación Nessus
          • Nessus (Análisis básico de vulnerabilidades)
          • Nessus (Análisis avanzado de vulnerabilidades)
        • Otras Herramientas
      • Explotación y Hacking de vulnerabilidades en Hosts
        • Explotación de vulnerabilidades
        • Explotacion manual de vulnerabilidades Host
        • Metasploit Herramienta
          • Introducción
          • Metasploit (Explotación básica)
          • Metasploit (explotación avanzada)
          • Metasploit (Creación de payloads personalizados)
          • Metasploit (Importando los resultados de Nessus)
          • Armitage (interfaz grafica de metasploit)
      • Explotación y Hacking de vulnerabilidades Web
        • Instalación de maquina virtual Ubuntu
        • Instalación aplicación Web vulnerable (Mutillidae II)
        • Burp Suite
          • Introducción
          • Spidering y Crawling con Burp Suite y skipfish
          • Inyecciones de codigo y contexto
        • Introducción (SQL Injection)
        • SQLmap Herramienta
          • SQLmap (Blind SQL Injection - Parte 1)
          • SQLmap (Funcionalidad - Parte 2)
        • Path Traversal o Directory Traversal
        • WebShells
        • Unrestricted File Upload
        • HTML Injection y Cross-Site-Scripting (XSS)
        • CSRF (Cross-site request forgery)
        • XSStrike Herramienta
        • Otras técnicas de explotación (Cookie Tampering, command injection...)
          • Command Injection
          • Cookie Tampering
        • Info Extra Burp Suite
      • Explotación y Hacking de vulnerabilidades en Red
        • Man in the middle (MITM)
        • Introducción e instalación de Bettercap
        • ARP Spoofing
        • DNS Spoofing
        • Social Engineering ToolKit (SET)
        • Polymorph Herramienta
          • Manipulación de trafico de red en tiempo real
          • Polymorph (Manipulación de trafico ICMP)
          • Polymorph (Manipulación de trafico MQTT)
          • BONUS (Explotando un fallo de seguridad en Windows 10)
          • DEMO (Explotación avanzada WINREG)
      • Técnicas de Post-Explotación
        • Introducción (Técnica de Post-Explotación)
        • Linux-Windows Meterpreter Post-Explotación
          • Linux (Meterpreter para Post-Explotación)
          • Windows (Meterpreter para Post-Explotación)
          • Elevación de privilegios (UAC Bypass)
          • Volcado de memoria con Mimikatz
        • Procdump y lsass.exe
        • Cracking de contraseñas (John the ripper y Hashcat)
        • Backdoors en binarios
        • Migración de meterpreter a otro proceso
        • Borrado de evidencias
          • Info
          • Linux (Herramientas Borrado de evidencias)
          • Windows (Herramientas Borrado de evidencias)
          • Archivos relevantes para eliminar
            • Rutas Windows Importantes que borrar
            • Rutas Linux Importantes que borrar
      • Machine Learning aplicado a Hacking
        • Introducción
        • Machine Learning aplicado a la Ciberseguridad
        • BATEA (Reconocimiento de hosts con ML)
        • Pesidious (Mutaciones con Deep Learning)
        • Ingeniería Social - Deep fake
  • ciberseguridad avanzada hacking ético
    • Contenido...
      • Entorno de aprendizaje
        • CherryTry
        • Entorno de trabajo (Kali Linux)
      • Recopilación avanzada de información
        • Introducción
        • Preparación del entorno - VulnHub
        • Preparación del entorno - Snort
        • Escaneo Avanzado de Hosts - Parte l
        • Escaneo avanzado de puertos
        • Fragmentación de paquetes con Nmap
        • Escaneo utilizando señuelos con Nmap
        • Spoofing de la identidad del atacante con Nmap
        • Control de velocidad de escaneo con Nmap
        • Escaneo en IPv6 con Nmap
        • Escaneo avanzado de servicios y OS
        • Alternativas a Nmap - Naabu y Netcat
        • Escaneo de puertos ultrarrápido - Masscan
      • Hacking Ético en entornos Active Directory - Parte 1
        • Introducción
        • Instalación y configuración del DC
        • Instalación de máquinas Windows en dominio
        • Características de AD - Usuarios, Grupos y OUs
        • Características de AD - GPOs y recursos compartidos
        • Recopilación de información en Active Directory
        • PowerView
        • Enumeración local de SAM
        • Enumeración remota de SAM
        • Impacket y Rpcclient
        • AD Module
        • Enumeración de NTDS - Parte 1
        • Enumeración de NTDS - Parte 2
        • Ldapsearch, pywerview, jxplorer
        • BloodHound
      • Hacking Ético en entornos Active Directory - Parte 2
        • Descriptores de seguridad y ACLs
        • Vulnerable AD
        • Identificación de ACLs vulnerables
        • Explotación de ACLs vulnerables
        • Explotación DCSync
        • Password Spraying
        • Funcionamiento de Kerberos
        • Kerberos en Active Directory
        • Enumeración de usuarios con Kerberos
        • Fuerza bruta con Kerberos
        • AS-REQ Roasting
        • Instalación Rubeus
        • AS-REP Roasting
        • TGS-REP Roasting (Kerberoasting)
      • Acceso a credenciales y movimientos laterales
        • Autenticación y Autorización en Windows
        • Volcado de Isass y SAM en Windows
        • Volcado de Isass y SAM en Linux
        • Volcado de credenciales de dominio cacheadas (mscash)
        • Pass-The-Hash con Windows
        • Pass-The-Hash con Linux
        • Over Pass-The-Hash - Pass-The-Key
        • Pass-The-Ticket
        • ASK-TGT - TGS
        • Kerberos Golden Ticket y Silver Ticket
        • NTLM Roasting
        • LLMNR - NBTNS Poisoning
        • NTLM - SMB Relay
        • Token impersonation
        • Problemas y errores instalación Covenant
        • Frameworks de postexplotación - Covenant
      • Hacking avanzado de aplicaciones web y Bug Bounty
        • Una palabras sobre Bug Bounty
        • Preparación del entorno vulnerable
        • Identificación de subdominios - Subfinder, Sublist3r y Subbrute
        • Identificación de tecnologías web - WhatWeb y WebAnalyzer
        • Identificación de contenido - Dirbuster
        • Gobuster y Seclists
        • Análisis de vulnerabilidades - OWASP ZAP Proxy
        • Nikto y Skipfish
        • Nuclei y Nuclei Templates
        • Fuzzing básico con ffuf
        • Fuzzing avanzado con ffuf
        • Explotación - Commix
        • Changeme, Gitleaks y CyberChef
      • Detección y evasión de defensas
        • Introducción a la evasión de defensas
        • Load Balancing detector - halberd
        • WAF detector - wafw00f
        • Evasión de WAF
        • Evasión de antivirus con C - Parte 1
        • Evasión de antivirus con C - Parte 2
        • Otras técnicas de evasión con C
        • Evasión de detección en tiempo real
        • Evasión con GreatSCT
        • Evasión con TheFatRat
        • Otras herramientas de evasión - Veil, Shellter, MSFManía...
      • Hacking Ético y Post-explotación avanzada
        • Port Forwarding
        • Port Forwarding con SSH
        • Pivoting
        • Netcat Port-Pivot Relay
        • Local Tunneling - LocalTunnel y Ngrok
        • Transferencia de ficheros
      • Hacking Ético en entornos reales (Amazon AWS)
        • Arquitectura y registro en la nube (AWS)
        • Infraestructura de red en la nube (AWS)
        • Seguridad y Computación en la nube (AWS)
        • Balanceadores y almacenamiento en la nube (AWS)
        • Recopilación de información en un entorno real
        • Controles de seguridad en un entorno real
        • Auditando la infraestructura interna
        • Tipos de auditorias de seguridad
  • PROYECTO DAM
    • Documentación PROYECTO_DAM
Powered by GitBook
On this page
  • Changeme
  • Gitleaks
  • CyberChef
  1. ciberseguridad avanzada hacking ético
  2. Contenido...
  3. Hacking avanzado de aplicaciones web y Bug Bounty

Changeme, Gitleaks y CyberChef

PreviousExplotación - CommixNextDetección y evasión de defensas

Last updated 2 months ago

Changeme

Primero vamos a ver la herramienta llamada Changeme que se encarga de buscar contraseñas por defecto en diferentes servicios que tenemos expuestos en nuestra infraestructura de red.

URL =

No viene por defecto en kali, por lo que tendremos que instalarlo de la siguiente forma:

sudo apt install changeme

Podemos utilizarla contra un host de la siguiente manera para intentar encontrar todos esos servicios o aplicaciones web en las que pueda tener credenciales por defecto.

changeme 192.168.5.211

Info:

 #####################################################
#       _                                             #
#   ___| |__   __ _ _ __   __ _  ___ _ __ ___   ___   #
#  / __| '_ \ / _` | '_ \ / _` |/ _ \ '_ ` _ \ / _ \\  #
# | (__| | | | (_| | | | | (_| |  __/ | | | | |  __/  #
#  \___|_| |_|\__,_|_| |_|\__, |\___|_| |_| |_|\___|  #
#                         |___/                       #
#  v1.2.3                                             #
#  Default Credential Scanner by @ztgrace             #
 #####################################################
    
Loaded 123 default credential profiles
Loaded 398 default credentials

No default credentials found

En este caso no va a encontrar nada ya que no tenemos puertos con credenciales por defecto.

Gitleaks

Ahora vamos a ver la herramienta Gitleaks que estara en el siguiente repositorio:

Esta herramienta se utiliza para poder descubrir contraseñas de un repositorio de GitHub, pero no solo los commits actuales, si no tambien los antiguos, ya que era muy comun el echo de que un usuario colgara en github un archivo de configuracion en el que tuviera algunas credenciales o contraseñas hardcodeadas y cuando se diera cuenta lo eliminaba y hacia otro nuevo commit pero el anterior todavia se puede observar, pues esto es lo que hace esta herramienta realizar toda esta busqueda en busca de alguna clave o contraseña, no viene por defecto instalada en kali por lo que tendremos que realizar lo siguiente:

sudo apt install gitleaks

Una vez instalado, vamos a realizar la prueba con un repositorio llamado mutillidae que seria el siguiente link:

Y ahora vamos a utilizar la herramienta contra dicho repositorio de la siguiente forma:

git clone https://github.com/webpwnized/mutillidae
cd mutillidae
gitleaks detect -v

Info:


    ○
    │╲
    │ ○
    ○ ░
    ░    gitleaks

Finding:     $lSigningKey = 'MIIBPAIBAAJBANBs46xCKgSt8vSgpGlDH0C8znhqhtOZQQjFCaQzcseGCVlrbI';
Secret:      MIIBPAIBAAJBANBs46xCKgSt8vSgpGlDH0C8znhqhtOZQQjFCaQzcseGCVlrbI
RuleID:      generic-api-key
Entropy:     5.071053
File:        src/jwt.php
Line:        34
Commit:      04c309aa4b28720d7cc0569169d55b209fb03eac
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-10-18T14:10:15Z
Fingerprint: 04c309aa4b28720d7cc0569169d55b209fb03eac:src/jwt.php:generic-api-key:34

Finding:     var lPasswordCharset = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
Secret:      ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789
RuleID:      generic-api-key
Entropy:     5.954196
File:        src/password-generator.php
Line:        49
Commit:      c9ff462f4405b921ecb6b2e96d7cb941ef6023af
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-10-08T21:10:28Z
Fingerprint: c9ff462f4405b921ecb6b2e96d7cb941ef6023af:src/password-generator.php:generic-api-key:49

Finding:     "hashed_secret": "aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d",
Secret:      aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
RuleID:      generic-api-key
Entropy:     3.646439
File:        .secrets.baseline
Line:        134
Commit:      e9e5328c79218612c1c120467b259afbf23c6082
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-10-04T17:41:53Z
Fingerprint: e9e5328c79218612c1c120467b259afbf23c6082:.secrets.baseline:generic-api-key:134

Finding:     "hashed_secret": "7c211433f02071597741e6ff5a8ea34789abbf43",
Secret:      7c211433f02071597741e6ff5a8ea34789abbf43
RuleID:      generic-api-key
Entropy:     3.762815
File:        .secrets.baseline
Line:        440
Commit:      e9e5328c79218612c1c120467b259afbf23c6082
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-10-04T17:41:53Z
Fingerprint: e9e5328c79218612c1c120467b259afbf23c6082:.secrets.baseline:generic-api-key:440

Finding:     "hashed_secret": "3c12d8b49a2185859491ef8c93545bac06b38051",
Secret:      3c12d8b49a2185859491ef8c93545bac06b38051
RuleID:      generic-api-key
Entropy:     3.715957
File:        .secrets.baseline
Line:        134
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:134

Finding:     "hashed_secret": "390ae0493a4e75e69d26d908122c74dfabc89081",
Secret:      390ae0493a4e75e69d26d908122c74dfabc89081
RuleID:      generic-api-key
Entropy:     3.868454
File:        .secrets.baseline
Line:        143
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:143

Finding:     "hashed_secret": "41ee220033b48e4399b8bf3abd8ec3abf34b451f",
Secret:      41ee220033b48e4399b8bf3abd8ec3abf34b451f
RuleID:      generic-api-key
Entropy:     3.568454
File:        .secrets.baseline
Line:        150
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:150

Finding:     "hashed_secret": "77e30d2814eaa789641f196427dcd6c3f039e051",
Secret:      77e30d2814eaa789641f196427dcd6c3f039e051
RuleID:      generic-api-key
Entropy:     3.839823
File:        .secrets.baseline
Line:        159
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:159

Finding:     "hashed_secret": "6b400726df61a3662c735b37fbc4b9443c11f24c",
Secret:      6b400726df61a3662c735b37fbc4b9443c11f24c
RuleID:      generic-api-key
Entropy:     3.615957
File:        .secrets.baseline
Line:        166
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:166

Finding:     "hashed_secret": "12345a894e65f7517b0ac62226c5372d8e9d3781",
Secret:      12345a894e65f7517b0ac62226c5372d8e9d3781
RuleID:      generic-api-key
Entropy:     3.856198
File:        .secrets.baseline
Line:        173
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:173

Finding:     "hashed_secret": "afe6b5701c1dc874f65b55a57e64e898dc64684f",
Secret:      afe6b5701c1dc874f65b55a57e64e898dc64684f
RuleID:      generic-api-key
Entropy:     3.665957
File:        .secrets.baseline
Line:        180
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:180

Finding:     "hashed_secret": "eb359f56b6fe136d56c6e1bbc036d8750ce57c37",
Secret:      eb359f56b6fe136d56c6e1bbc036d8750ce57c37
RuleID:      generic-api-key
Entropy:     3.525070
File:        .secrets.baseline
Line:        187
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:187

Finding:     "hashed_secret": "2fd3d703201b78d49b09b1fa0fcb3dd3dfec3d80",
Secret:      2fd3d703201b78d49b09b1fa0fcb3dd3dfec3d80
RuleID:      generic-api-key
Entropy:     3.550159
File:        .secrets.baseline
Line:        194
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:194

Finding:     "hashed_secret": "e588744582118f5ba412b8f95cf6bdb775df63b0",
Secret:      e588744582118f5ba412b8f95cf6bdb775df63b0
RuleID:      generic-api-key
Entropy:     3.744589
File:        .secrets.baseline
Line:        203
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:203

Finding:     "hashed_secret": "5e0f9abcad55a1eb2dcde00285ea2d2b9d96b300",
Secret:      5e0f9abcad55a1eb2dcde00285ea2d2b9d96b300
RuleID:      generic-api-key
Entropy:     3.572574
File:        .secrets.baseline
Line:        212
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:212

Finding:     "hashed_secret": "74913f5cd5f61ec0bcfdb775414c2fb3d161b620",
Secret:      74913f5cd5f61ec0bcfdb775414c2fb3d161b620
RuleID:      generic-api-key
Entropy:     3.687326
File:        .secrets.baseline
Line:        219
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:219

Finding:     "hashed_secret": "83bb2837d428a69beda67d8562fbf220e04d62d0",
Secret:      83bb2837d428a69beda67d8562fbf220e04d62d0
RuleID:      generic-api-key
Entropy:     3.625071
File:        .secrets.baseline
Line:        226
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:226

Finding:     "hashed_secret": "5084602a0f6c6d69b90350357a2db815b566cc19",
Secret:      5084602a0f6c6d69b90350357a2db815b566cc19
RuleID:      generic-api-key
Entropy:     3.697085
File:        .secrets.baseline
Line:        233
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:233

Finding:     "hashed_secret": "3c12d8b49a2185859491ef8c93545bac06b38051",
Secret:      3c12d8b49a2185859491ef8c93545bac06b38051
RuleID:      generic-api-key
Entropy:     3.715957
File:        .secrets.baseline
Line:        242
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:242

Finding:     "hashed_secret": "de66cbee01a0c71498207e26805002c7e7040f5f",
Secret:      de66cbee01a0c71498207e26805002c7e7040f5f
RuleID:      generic-api-key
Entropy:     3.625071
File:        .secrets.baseline
Line:        251
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:251

Finding:     "hashed_secret": "be4fc4886bd949b369d5e092eb87494f12e57e5b",
Secret:      be4fc4886bd949b369d5e092eb87494f12e57e5b
RuleID:      generic-api-key
Entropy:     3.673220
File:        .secrets.baseline
Line:        260
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:260

Finding:     "hashed_secret": "9a9696f853f8d0877dc6f236a9a0ec4383b059d5",
Secret:      9a9696f853f8d0877dc6f236a9a0ec4383b059d5
RuleID:      generic-api-key
Entropy:     3.737326
File:        .secrets.baseline
Line:        269
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:269

Finding:     "hashed_secret": "d4a46d37f9877a741117e8249d92d63a993d8e40",
Secret:      d4a46d37f9877a741117e8249d92d63a993d8e40
RuleID:      generic-api-key
Entropy:     3.535475
File:        .secrets.baseline
Line:        276
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:276

Finding:     "hashed_secret": "8ae2994235b7c08d5d2b93b3831a4fef3ec29093",
Secret:      8ae2994235b7c08d5d2b93b3831a4fef3ec29093
RuleID:      generic-api-key
Entropy:     3.737326
File:        .secrets.baseline
Line:        283
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:283

Finding:     "hashed_secret": "4c3054baf6d360c82a71ffc7e1dafa2784c1a9ed",
Secret:      4c3054baf6d360c82a71ffc7e1dafa2784c1a9ed
RuleID:      generic-api-key
Entropy:     3.856198
File:        .secrets.baseline
Line:        290
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:290

Finding:     "hashed_secret": "db15ae43c53546da3da33a127fcc34d64ba13186",
Secret:      db15ae43c53546da3da33a127fcc34d64ba13186
RuleID:      generic-api-key
Entropy:     3.533783
File:        .secrets.baseline
Line:        297
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:297

Finding:     "hashed_secret": "4b0d54823ef3fb1d7b49f273d6cae466fd47de4e",
Secret:      4b0d54823ef3fb1d7b49f273d6cae466fd47de4e
RuleID:      generic-api-key
Entropy:     3.718454
File:        .secrets.baseline
Line:        304
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:304

Finding:     "hashed_secret": "637c8369257406fc9d74c0b8df1d4e8303664aac",
Secret:      637c8369257406fc9d74c0b8df1d4e8303664aac
RuleID:      generic-api-key
Entropy:     3.806198
File:        .secrets.baseline
Line:        313
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:313

Finding:     "hashed_secret": "e875aada76e4eff92ddd55c84c81a84e90217518",
Secret:      e875aada76e4eff92ddd55c84c81a84e90217518
RuleID:      generic-api-key
Entropy:     3.675071
File:        .secrets.baseline
Line:        327
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:327

Finding:     "hashed_secret": "aa9b2d59ba3c5e9308a640496cb9708fe4b6cea9",
Secret:      aa9b2d59ba3c5e9308a640496cb9708fe4b6cea9
RuleID:      generic-api-key
Entropy:     3.699582
File:        .secrets.baseline
Line:        334
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:334

Finding:     "hashed_secret": "ec8aae3c54704bf2ff410f2ace955f60dfa9a983",
Secret:      ec8aae3c54704bf2ff410f2ace955f60dfa9a983
RuleID:      generic-api-key
Entropy:     3.780710
File:        .secrets.baseline
Line:        341
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:341

Finding:     "hashed_secret": "7435c76a2794b5a23d34a1ba3d10c632c9ecec08",
Secret:      7435c76a2794b5a23d34a1ba3d10c632c9ecec08
RuleID:      generic-api-key
Entropy:     3.784830
File:        .secrets.baseline
Line:        357
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:357

Finding:     "hashed_secret": "57bc04b0e482a3ad71adbe2f8f5d91c011771420",
Secret:      57bc04b0e482a3ad71adbe2f8f5d91c011771420
RuleID:      generic-api-key
Entropy:     3.787326
File:        .secrets.baseline
Line:        364
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:364

Finding:     "hashed_secret": "aae8f38bd453f9d8860732e7bdb66a80f59a5526",
Secret:      aae8f38bd453f9d8860732e7bdb66a80f59a5526
RuleID:      generic-api-key
Entropy:     3.706198
File:        .secrets.baseline
Line:        371
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:371

Finding:     "hashed_secret": "fca01d744d954284d5acbd1c111bd442ee478c73",
Secret:      fca01d744d954284d5acbd1c111bd442ee478c73
RuleID:      generic-api-key
Entropy:     3.631287
File:        .secrets.baseline
Line:        378
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:378

Finding:     "hashed_secret": "ebdc7fbc6865266dc6db2b118df193123830b47a",
Secret:      ebdc7fbc6865266dc6db2b118df193123830b47a
RuleID:      generic-api-key
Entropy:     3.765957
File:        .secrets.baseline
Line:        387
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:387

Finding:     "hashed_secret": "8fa8f4fcd1b98862f0a26551f87e01a95fcaa6a4",
Secret:      8fa8f4fcd1b98862f0a26551f87e01a95fcaa6a4
RuleID:      generic-api-key
Entropy:     3.649582
File:        .secrets.baseline
Line:        396
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:396

Finding:     "hashed_secret": "6633843895c1bdc0369e45aa3ac486fa7987a21c",
Secret:      6633843895c1bdc0369e45aa3ac486fa7987a21c
RuleID:      generic-api-key
Entropy:     3.753702
File:        .secrets.baseline
Line:        405
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:405

Finding:     "hashed_secret": "b630113eab920835f2e56fe1c2a84a23214d6bc9",
Secret:      b630113eab920835f2e56fe1c2a84a23214d6bc9
RuleID:      generic-api-key
Entropy:     3.806198
File:        .secrets.baseline
Line:        414
Commit:      35d173009b2ad59239b30d59fc06ce3e73152581
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2024-09-17T20:17:16Z
Fingerprint: 35d173009b2ad59239b30d59fc06ce3e73152581:.secrets.baseline:generic-api-key:414

Finding:     -----BEGIN RSA PRIVATE KEY-----                                 
MIISKgIBAAKCBAEAlH1pj1kxWhfJRazHPLmL+oXj3/vyXN9V6JgLE5gqFXMn+REc
mLf...                                                          -
Secret:      -----BEGIN RSA PRIVATE KEY-----                                 
MIISKgIBAAKCBAEAlH1pj1kxWhfJRazHPLmL+oXj3/vyXN9V6JgLE5gqFXMn+REc
mLf...                                                          
RuleID:      private-key
Entropy:     6.030921
File:        labs/lab-files/open-ssl-lab-files/private-key.pem
Line:        1
Commit:      55cd03eb0f76c7b23d6c53dd932555f83709f834
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2021-05-09T20:07:04Z
Fingerprint: 55cd03eb0f76c7b23d6c53dd932555f83709f834:labs/lab-files/open-ssl-lab-files/private-key.pem:private-key:1

Finding:     echo 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp... | cut -d. -f1 | bas...
Secret:      eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp...
RuleID:      jwt
Entropy:     5.666804
File:        includes/hints/jwt-hint.inc
Line:        46
Commit:      2b90452899ec9738e78412a6c078473775d71cca
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2021-04-12T20:38:03Z
Fingerprint: 2b90452899ec9738e78412a6c078473775d71cca:includes/hints/jwt-hint.inc:jwt:46

Finding:     echo 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp... | cut -d. -f1 | bas...
Secret:      eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp...
RuleID:      jwt
Entropy:     5.666804
File:        includes/hints/jwt-hint.inc
Line:        46
Commit:      4aae3da8d0dcd127997f446ac14c89da2def9be7
Author:      Jeremy Druin
Email:       webpwnized@users.noreply.github.com
Date:        2021-03-03T23:22:08Z
Fingerprint: 4aae3da8d0dcd127997f446ac14c89da2def9be7:includes/hints/jwt-hint.inc:jwt:46

Finding:     echo 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp... | cut -d. -f2 | bas...
Secret:      eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp...
RuleID:      jwt
Entropy:     5.666804
File:        includes/hints/jwt-hint.inc
Line:        50
Commit:      4aae3da8d0dcd127997f446ac14c89da2def9be7
Author:      Jeremy Druin
Email:       webpwnized@users.noreply.github.com
Date:        2021-03-03T23:22:08Z
Fingerprint: 4aae3da8d0dcd127997f446ac14c89da2def9be7:includes/hints/jwt-hint.inc:jwt:50

Finding:     echo 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp... > token
Secret:      eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOlwvXC9tdXRpbGxpZGFlLmxvY2FsIiwiYXVkIjoiaHR0cDp...
RuleID:      jwt
Entropy:     5.657828
File:        includes/hints/jwt-hint.inc
Line:        76
Commit:      4aae3da8d0dcd127997f446ac14c89da2def9be7
Author:      Jeremy Druin
Email:       webpwnized@users.noreply.github.com
Date:        2021-03-03T23:22:08Z
Fingerprint: 4aae3da8d0dcd127997f446ac14c89da2def9be7:includes/hints/jwt-hint.inc:jwt:76

Finding:     New Token: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOi8vbXV0aWxsaWRhZS5sb2NhbCIsImF1ZCI6Imh0dHA6Ly9...
Secret:      eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwOi8vbXV0aWxsaWRhZS5sb2NhbCIsImF1ZCI6Imh0dHA6Ly9...
RuleID:      jwt
Entropy:     5.636582
File:        includes/hints/jwt-hint.inc
Line:        100
Commit:      4aae3da8d0dcd127997f446ac14c89da2def9be7
Author:      Jeremy Druin
Email:       webpwnized@users.noreply.github.com
Date:        2021-03-03T23:22:08Z
Fingerprint: 4aae3da8d0dcd127997f446ac14c89da2def9be7:includes/hints/jwt-hint.inc:jwt:100

Finding:     $lKey = 'MIIBPAIBAAJBANBs46xCKgSt8vSgpGlDH0C8znhqhtOZQQjFCaQzcseGCVlrbI';
Secret:      MIIBPAIBAAJBANBs46xCKgSt8vSgpGlDH0C8znhqhtOZQQjFCaQzcseGCVlrbI
RuleID:      generic-api-key
Entropy:     5.071053
File:        ajax/jwt.php
Line:        52
Commit:      063153c126b6e55dcc52307ee6cbbd576f34ac64
Author:      LucanSec
Email:       lucansilva@protonmail.com
Date:        2020-12-18T14:09:40Z
Fingerprint: 063153c126b6e55dcc52307ee6cbbd576f34ac64:ajax/jwt.php:generic-api-key:52

Finding:     $lKey = 'MIIBPAIBAAJBANBs46xCKgSt8vSgpGlDH0C8znhqhtOZQQjFCaQzcseGCVlrbI';
Secret:      MIIBPAIBAAJBANBs46xCKgSt8vSgpGlDH0C8znhqhtOZQQjFCaQzcseGCVlrbI
RuleID:      generic-api-key
Entropy:     5.071053
File:        jwt.php
Line:        32
Commit:      063153c126b6e55dcc52307ee6cbbd576f34ac64
Author:      LucanSec
Email:       lucansilva@protonmail.com
Date:        2020-12-18T14:09:40Z
Fingerprint: 063153c126b6e55dcc52307ee6cbbd576f34ac64:jwt.php:generic-api-key:32

Finding:     -----BEGIN PRIVATE KEY-----                                     
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQD5+8rWPBfpo2aj
hgOYAfI...                                                      -
Secret:      -----BEGIN PRIVATE KEY-----                                     
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQD5+8rWPBfpo2aj
hgOYAfI...                                                      
RuleID:      private-key
Entropy:     6.015054
File:        data/mutillidae-selfsigned.key
Line:        1
Commit:      86396b7f3716821f280a5b7a79c6e6fca1b9e982
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2020-04-14T00:08:07Z
Fingerprint: 86396b7f3716821f280a5b7a79c6e6fca1b9e982:data/mutillidae-selfsigned.key:private-key:1

Finding:     if ($lAuthor == "53241E83-76EC-4920-AD6D-503DD2A6BA68" || strlen($lAuthor)...
Secret:      53241E83-76EC-4920-AD6D-503DD2A6BA68
RuleID:      generic-api-key
Entropy:     3.829240
File:        view-someones-blog.php
Line:        169
Commit:      0f9d4a66f2540f5154c01476e81161935aad6291
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2018-09-28T02:48:39Z
Fingerprint: 0f9d4a66f2540f5154c01476e81161935aad6291:view-someones-blog.php:generic-api-key:169

Finding:     if ($lAuthor == "6C57C4B5-B341-4539-977B-7ACB9D42985A"){
Secret:      6C57C4B5-B341-4539-977B-7ACB9D42985A
RuleID:      generic-api-key
Entropy:     3.593400
File:        view-someones-blog.php
Line:        172
Commit:      0f9d4a66f2540f5154c01476e81161935aad6291
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2018-09-28T02:48:39Z
Fingerprint: 0f9d4a66f2540f5154c01476e81161935aad6291:view-someones-blog.php:generic-api-key:172

Finding:     }// end if ($lAuthor == "53241E83-76EC-4920-AD6D-503DD2A6BA68" || strlen($lAuthor)...
Secret:      53241E83-76EC-4920-AD6D-503DD2A6BA68
RuleID:      generic-api-key
Entropy:     3.829240
File:        view-someones-blog.php
Line:        234
Commit:      0f9d4a66f2540f5154c01476e81161935aad6291
Author:      webpwnized
Email:       webpwnized@gmail.com
Date:        2018-09-28T02:48:39Z
Fingerprint: 0f9d4a66f2540f5154c01476e81161935aad6291:view-someones-blog.php:generic-api-key:234

3:32AM INF 733 commits scanned.
3:32AM INF scan completed in 2.65s
3:32AM WRN leaks found: 51

Y por lo que vemos nos ha sacado varias cosas interesante, entre ellas bastantes claves.

CyberChef

Vamos con la ultima herramienta llamada CyberChef que se encuentra en el siguiente repositorio:

Pero tambien lo tenemos en una aplicacion web que seria en el siguiente link:

Esta herramienta sirve para poder codificar o decodificar hashes de diferentes formatos y es muy buena la pagina, tenemos muchisimos formatos a elegir y podemos configurarlo de forma muy avanzada a nuestro gusto.

Y ya no solo sirve para crackear si no que podremos pasar letras mayusculas a minusculas y vicebersa, tambien podremos detectar expresiones regulares de cualquier texto, podremos hacer muchisimas mas cosas con esta herramienta, esta muy completa.

URL =

URL =

URL =

URL =

Changeme GitHub
Gitleaks GitHub
Mutillidae GitHub
CyberChef GitHub
Aplicacion web CyberChef