Gitlab
Get Gitlab Version: The only way to footprint the GitLab version number in use is by browsing to the /help
page when logged in.
These Git repositories may just hold publicly available code such as scripts to interact with an API.
We may also find scripts or configuration files that were accidentally committed containing cleartext secrets such as passwords.
We may also come across SSH private keys.
We can attempt to use the search function to search for users, passwords, etc.
Applications such as GitLab allow for public repositories (that require no authentication) It is also worth perusing any public repositories for sensitive data.
Internal repositories (available to authenticated users)
private repositories (restricted to specific users).
If the application allows, register an account and look to see if any interesting internal repositories are accessible.
We do not recommend launching various exploits at an application
Enumerating
The first thing we should try is browsing to
/explore
and see if there are any public projects that may contain something interestingSearch inside the projects and look around, you could find interesting things such as production code that we can find a bug in after a code review, hard-coded credentials, a script or configuration file containing credentials, or other secrets such as an SSH private key or API key.
Explore each of the pages linked in the top left
groups
,snippets
, andhelp
.We should check and see if we can register an account and access additional projects.
Use the registration form
/users/sign_up
to enumerate valid users, doing that we could attempt to guess weak passwords or possibly re-use credentials that we find from a password dump using a tool such asDehashed
User enumeraton
As with any type of password spraying attack, we should be mindful of account lockout and other kinds of interruptions. GitLab's defaults are set to 10 failed attempts resulting in an automatic unlock after 10 minutes.
https://www.exploit-db.com/exploits/49821
Exploits
Interesting blogs
https://tillsongalloway.com/finding-sensitive-information-on-github/index.html
Last updated