Exposed Git Config Files Leak Thousands of Cloud Credentials

Exposed Git Config Files Leak Thousands of Cloud Credentials

Mental Outlaw

54 года назад

65,758 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@atherlie5870
@atherlie5870 - 08.11.2024 06:14

do you know about any services like file cloud for creating or helping to create your own personal cloud storage in home? are there services that build it and ship it can you build it and network it yourself? idk not a tech wiz just curious

Ответить
@bottering_one
@bottering_one - 08.11.2024 06:16

i see you backed down from the shitty ai dubs lol

Ответить
@uuu12343
@uuu12343 - 08.11.2024 07:09

Man, what happened to the age old best practice of setting the secret/api key in an environment variable, then reference/obtain the value in the source code from the environment variable

Ответить
@Aranimda
@Aranimda - 08.11.2024 07:50

With the current speed of leaks, I will have to consider any of my online accounts to be open and public property.

Ответить
@jonreznick5531
@jonreznick5531 - 08.11.2024 07:57

imagine not using code secrets correctly.

Ответить
@VivekYadav-ds8oz
@VivekYadav-ds8oz - 08.11.2024 07:59

IMO we should just develop a habit to create our environment file one directory up the git project. So that even if you accidentally forget to put it in your .gitignore, it wouldn't get checked out.

Ответить
@rh906
@rh906 - 08.11.2024 08:03

Open source is a meme.

Ответить
@RealCheesyBread
@RealCheesyBread - 08.11.2024 08:12

GitHub is where I go to get free openai keys

Ответить
@KS-ep9rx
@KS-ep9rx - 08.11.2024 08:51

Next reason to use zero knowlage structure instand of train ai on user private data

Ответить
@21fobia
@21fobia - 08.11.2024 08:51

this really shines a light on the hidden risks of sloppy Git practices! the script breakdown is fascinating.

Ответить
@Holphana
@Holphana - 08.11.2024 08:55

ahh yes... it "leaked". Conveniently right after updating the icloud service terms and conditions to explicitly state that they are not at fault for these kinds of exploits.
Computers were definitely invented for your entertainment and not to monitor/control the exchange of information.

Ответить
@seventhtenth
@seventhtenth - 08.11.2024 09:11

now I know why I see "why gitlab?"

Ответить
@0007-i2l
@0007-i2l - 08.11.2024 09:21

Thank you for listening to us and dont activate this akward ai translation

Ответить
@AQMPolyface
@AQMPolyface - 08.11.2024 10:19

I leaked 2 database password and 1 api key last week (I know I am a dumbass, but I just started my developer journey) so thank, I didn't knew the api key scanner existed. It will be very helpfull

Ответить
@BeverageOfSorts
@BeverageOfSorts - 08.11.2024 10:49

Ah so that's why I got kicked out of epic games repo

Ответить
@xanaxity
@xanaxity - 08.11.2024 10:51

Smooth af 😂

Ответить
@r0nni34
@r0nni34 - 08.11.2024 12:03

I have some personal domains set-up for workers and object storage. Within past few days i am getting a lot of hits on my storage subdomain

Ответить
@TechXSoftware
@TechXSoftware - 08.11.2024 12:27

Self-host, problem solved

Ответить
@DoomCatcher
@DoomCatcher - 08.11.2024 12:43

Git gud

Ответить
@randomdude5634
@randomdude5634 - 08.11.2024 13:22

hmhmmmmmmmmm

Ответить
@ammarahmed7566
@ammarahmed7566 - 08.11.2024 14:02

Always revoke

Ответить
@dariofagotto4047
@dariofagotto4047 - 08.11.2024 14:07

Was just looking at some logs from Apache and stuff and it's so common to get both wordpress config and .git/config requests passing by

Ответить
@lukasdoerr
@lukasdoerr - 08.11.2024 15:11

Thank you for not forcing AI Voiceover on this video! Finally a watchable video again

Ответить
@IR240474
@IR240474 - 08.11.2024 16:28

I can't even get Outlook to create POP account.. I changed the password 3 times... FFS... lolz...

Ответить
@theIbraDev
@theIbraDev - 08.11.2024 16:47

This is not a hack, git issue or anthing like that. It's just insane skillissues and total ignorance og security. It's not a hack when they are themselves publishing their secrets.

Ответить
@challacustica9049
@challacustica9049 - 08.11.2024 16:51

And this is why I'm glad to have a locally hosted git server on an intranet.

Ответить
@ccriztoff
@ccriztoff - 08.11.2024 18:06

Having secrets in a commit is insane 😂

Ответить
@slavsquatsuperstar
@slavsquatsuperstar - 08.11.2024 18:40

“This is a bucket.”
“Dear God.”
“There’s more.
“No.”
“It contains the credentials of every person in this room.”

Ответить
@patricknelson
@patricknelson - 08.11.2024 19:46

Tip: Also use .dockerignore and ensure you exclude .env and .git/ folder files as well. That’s easy to forget. Also: NEVER store secrets in plain text on the file system unencrypted, a.k.a. Have it always be “encrypted at rest”. At least for production credentials if not for non/pre-production stuff.

Ответить
@Francois_Dupont
@Francois_Dupont - 08.11.2024 21:08

basically a script kiddy took 30mins to use things that was already available online.
seems to me that its 100% github fault for building a shitty website.

Ответить
@Francois_Dupont
@Francois_Dupont - 08.11.2024 21:14

why didnt github have a simple monitor script that scan the uploaded files and warn people about this?
like: WARNING you uploaded loging credential you dumdumb!! REMOVE this

Ответить
@RockylarsYT
@RockylarsYT - 08.11.2024 21:24

Or to just use a .env.example file

Ответить
@TechAceYoutube
@TechAceYoutube - 08.11.2024 22:32

OH MY ZSH!

Ответить
@unixd0rk
@unixd0rk - 08.11.2024 22:42

I wonder what happens if you make a decoy git repo config with an infinite-loop in the structure?

Ответить
@ordinarygg
@ordinarygg - 09.11.2024 00:57

The problem is not keys in project, the problem is exposing .git repo lol it's even bigger issue

Ответить
@therealslimaddy
@therealslimaddy - 09.11.2024 01:10

time to shift left to onprem & good ol trusty middleware

Ответить
@SergeantExtreme
@SergeantExtreme - 09.11.2024 02:23

Hey Outlaw, could I ask you a question?

Ответить
@kehan6252
@kehan6252 - 09.11.2024 13:24

How TF is this git directory 18 GB??

Ответить
@HatelivesNextDoor
@HatelivesNextDoor - 09.11.2024 14:11

Epic visualization!

Ответить
@namenlosNamenlos
@namenlosNamenlos - 09.11.2024 14:18

.

Ответить
@0xshaheen
@0xshaheen - 09.11.2024 16:13

I don't want to help the attackers, but the step of obtaining the creds from .git/config can be skipped, using a tool like git-dumper to download the whole repo, and that my friend would increase the target pool to apps not even using github or it's token auth

Ответить
@kayakMike1000
@kayakMike1000 - 09.11.2024 22:44

Uh.... I thought we're supposed to use private keys?

Ответить
@kayakMike1000
@kayakMike1000 - 09.11.2024 22:46

Code REVIEW, MAN!!!
why wasn't this caught in code review?
There are commit hooks to avoid this...

Ответить
@metalspoon69
@metalspoon69 - 10.11.2024 12:44

This is exactly why I host sensitive git repo's on premise lmao

Ответить
@sodanakin
@sodanakin - 10.11.2024 18:23

This channel and comments always read as if its a room full of experts. Except nobody has a real clue what they are talking about.

Ответить
@kivylius
@kivylius - 12.11.2024 12:27

Your first commit should be gitignore the env

Ответить
@Zeftax
@Zeftax - 12.11.2024 14:59

Are you now using AI for your graphics? Ewww.

Ответить
@danielschmider5069
@danielschmider5069 - 12.11.2024 18:38

do I misunderstand something or did they just not use .gitignore? was there something else?

Ответить
@AlexanderHL1919
@AlexanderHL1919 - 17.11.2024 00:12

"There is no cloud, just someone else's computer."

Ответить