TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Google Search: Inurl:server Filetype:key “-----BEGIN RSA PRIVATE KEY-----”

172 pointsby andygamblesalmost 8 years ago

15 comments

demarqalmost 8 years ago
Hmmm my idea would be<p>&quot;Hello from github,<p>We detected that you uploaded credentials to NAME_OF_REPO. We strongly advise against this as it allows attackers to easily gain unauthorized access to your software and infrastructure.<p>Have a look at this blog where we discuss alternatives&quot;<p>EDIT: Just to be clear, I&#x27;m not suggesting a ban at all, just a friendly email in response to commits that introduce credentials to public repos
评论 #14895539 未加载
评论 #14891162 未加载
评论 #14891425 未加载
评论 #14891276 未加载
评论 #14892000 未加载
graystevensalmost 8 years ago
The wonders of the &quot;Googledork&quot;. There is a lot of information out there which definitely shouldn&#x27;t be public: <a href="https:&#x2F;&#x2F;www.exploit-db.com&#x2F;google-hacking-database&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.exploit-db.com&#x2F;google-hacking-database&#x2F;</a>
athenotalmost 8 years ago
It&#x27;s worth pointing out that some of these are configuation examples, illustrations of how to set something up. (Though of course that carries the risk that less thorough users just copy-paste that into production and call it a day.)
评论 #14893088 未加载
gargravarralmost 8 years ago
One of the more amusing patterns I spotted in the URLs is where an alarming amount of the filesystem appears to be exposed, e.g.:<p>www.dulceswilly.com&#x2F;mysql&#x2F;BHP_sym&#x2F;root&#x2F;usr&#x2F;local&#x2F;etc&#x2F;apache22&#x2F;server.key<p>If I was on a non-company IP, I&#x27;d be tempted to poke around and see what else is visible...
评论 #14893648 未加载
评论 #14891721 未加载
kuschkualmost 8 years ago
You should check out how many services have their entire git repo of their service openly accessible (this allows getting the data out of the git objects, as well as the history).<p>Quite often you can go to domain.tld&#x2F;.git&#x2F; and find the files if you know their names. Even major sites - The Hill only fixed it in the past few days.
评论 #14891516 未加载
评论 #14891831 未加载
评论 #14892079 未加载
dsaccoalmost 8 years ago
I was a little surprised to see an Apple domain in there, but I can&#x27;t really tell what the private key was for (could have been a test or an example). It looks like it&#x27;s either an outdated result or an Apple engineer quickly saw this and fixed it because the page 404s now.
评论 #14892188 未加载
blubb-fishalmost 8 years ago
that yields just 7 pages (10 items each) so it&#x27;s probably pretty irrelevant.<p>but of course you are welcome to share your run of the mill anecdotes about some intern once accidentally publishing passwords - etc. :)
评论 #14891881 未加载
dzhiurgisalmost 8 years ago
Slightly related question about API keys that rely on referer (say Google Vision) - what stops me using curl to spoof referer and rake in thousands in someone’s bill (15 cents per 1k recognitions)?<p>I assume there’s some IP based quota, but I haven’t seen a knob for that on GCP at least.
评论 #14891323 未加载
评论 #14891361 未加载
clarkey252almost 8 years ago
Can someone explain why the inurl:server is used? Wouldn&#x27;t this also work without that (and reveal more results where the keyfile has been renamed)
评论 #14891882 未加载
评论 #14891397 未加载
评论 #14891436 未加载
评论 #14891380 未加载
andygamblesalmost 8 years ago
Some of the results are web servers leaking the private keys of the website or in some cases mail servers.
devyalmost 8 years ago
The sixth link from the Google result, <a href="https:&#x2F;&#x2F;jpl-vmdb03.inetuhosted.net&#x2F;sjsuvc.drivingcreative.com&#x2F;server.key" rel="nofollow">https:&#x2F;&#x2F;jpl-vmdb03.inetuhosted.net&#x2F;sjsuvc.drivingcreative.co...</a>,<p>Is that the JPL I thought it was?
评论 #14893544 未加载
luordalmost 8 years ago
This I pure paranoia fuel. I don&#x27;t think I&#x27;ve done this (or what someone else mentioned about leaving the .git folder open in the server) but I&#x27;ll double check anyway.
stonewhitealmost 8 years ago
I am definitely making this a part of regular security scan.
dingo_batalmost 8 years ago
It took me about 15 seconds to understand. WTF! Why are people uploading their private keys to github?!
评论 #14894168 未加载
bonoetmaloalmost 8 years ago
Google lost its mind when I clicked this link. Signed me out, turned on SafeSearch and threw up some privacy notice dialog at the top of the page.
评论 #14891543 未加载