Cloud Pen-testing Part -6
## GitLeaks
Search repositories for secrets
https://github.com/zricethezav/gitleaks
Pull GitLeaks with Docker
```shell
sudo docker pull zricethezav/gitleaksPrint the help menu
sudo docker run --rm --name=gitleaks zricethezav/gitleaks --helpUse GitLeaks to search for secrets
sudo docker run --rm --name=gitleaks zricethezav/gitleaks -v -r <repo URL>Mimikatz
Export Non-Exportable Private Keys From Web Server
mimikatz# crypto::capi
mimikatz# privilege::debug
mimikatz# crypto::cng
mimikatz# crypto::certificates /systemstore:local_machine /store:my /exportDump password hashes from SAM/SYSTEM files
Check Command History
Linux Bash History Location
Windows PowerShell PSReadLine Location
PowerView
https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon
Find on-prem ADConnect account name and server
FireProx
Password Spraying Azure/O365 while randomizing IPs with FireProx
Install
Launch FireProx
Password spray using FireProx + MSOLSpray
ip2Provider
Check a list of IP addresses against cloud provider IP space
https://github.com/oldrho/ip2provider
Vulnerable Infrastructure Creation
Cloudgoat - https://github.com/RhinoSecurityLabs/cloudgoat
SadCloud - https://github.com/nccgroup/sadcloud
Flaws Cloud - http://flaws.cloud
Thunder CTF - http://thunder-ctf.cloud
Please note that the above information is provided for reference purposes. Make sure to review and use these tools responsibly and ethically within the boundaries of applicable laws and regulations.
Last updated
Was this helpful?