🤬
f46b5405
ROOT /
Web /
20220824 - From Recon to Getting P1 on TESLA.md
33 lines | UTF-8 | 1 KB

From Recon to Getting P1 on TESLA 👻

1. Find out target servers IP

  • Tools: Censys and dnsdumpster 20220824-3.png 20220824-4.png
     

2.Finding GetLab on One of the IPs

20220824-5.png
 

3. Misconfiguration on GitLab Target

  • Any one had Access to explore in groups 20220824-6.png 20220824-7.png
     

4. Test Default Passwords on Found Username

  • I found user allowed me to login with password: "password"
  • I could manage so many projects in it.
  • Program owner awarded a bounty worth P1 for this find. 20220824-8.png
     

Credit

Based on YoKo Kho's write-up.
 

Support

You can Follow me on twitter or buy me a Coffee

Please wait...
Page is in error, reload to recover