1 | | - | # Leaked-Credentials |
2 | | - | how to look for Leaked Credentials ! |
| 1 | + | To search for leaked credentials using Google Chrome's Developer Tools and regex, follow these short steps: |
| 2 | + | |
| 3 | + | 1. **Open DevTools:** In Chrome, navigate to the site you're inspecting, then open Developer Tools with `Ctrl+Shift+I` (Windows/Linux) or `Cmd+Option+I` (macOS). |
| 4 | + | 2. **Go to Network Tab:** Click on the "Network" tab. |
| 5 | + | 3. **Enable Regex Search:** Click the regex icon in the filter bar to enable regex mode. |
| 6 | + | 4. **Refresh Page:** Refresh the page to load all network requests. |
| 7 | + | 5. **Apply Regex:** Paste the given regex into the filter bar to search for patterns indicating leaked credentials. |
| 8 | + | |
| 9 | + | ```regex |
| 10 | + | |
| 11 | + | ((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_ .\-,]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z\-_=]{8,64})['\"] |
| 12 | + | ``` |
| 13 | + | |
| 14 | + | 6. **Review Matches:** Manually inspect the filtered requests to identify potential leaks. |
| 15 | + | |
| 16 | + | ![image](https://github.com/h4x0r-dz/Leaked-Credentials/assets/26070859/d6b5ea05-90e9-4fa8-b449-911f3c3c653b) |
| 17 | + | |
3 | 18 | | |