paint-brush
Here's What I Found on Scanning 2.6 Million Domains for Exposed Git Directoriesby@sdcat
1,050 reads
1,050 reads

Here's What I Found on Scanning 2.6 Million Domains for Exposed Git Directories

by sdcat4mOctober 24th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A software developer scanned 2.6 million domains for exposed git directories and found more than 1000 public git repositories. These repositories contained harmless data like template files or static HTML pages. Some repositories revealed interesting things such as source code for web applications, databases credentials, Office 365 admin logins, private keys or RCE (remote code execution) possibilities. Even if you do not have the directory listing of a git folder from the webserver, you can download the entire content of the repository. Never expose your hidden git folder to the public.
featured image - Here's What I Found on Scanning 2.6 Million Domains for Exposed Git Directories
sdcat HackerNoon profile picture
sdcat

sdcat

@sdcat

Software developing cat

0-item

STORY’S CREDIBILITY

Original Reporting

Original Reporting

This story contains new, firsthand information uncovered by the writer.

L O A D I N G
. . . comments & more!

About Author

sdcat HackerNoon profile picture
sdcat@sdcat
Software developing cat

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Learnrepo
Coffee-web
Allyoucantech
Thetechstreetnow