Hanno Böck
https://hboeck.de/
Twitter: @hanno
wget https://example.com/app/etc/local.xml
wget https://example.com/.git/config
https://github.com/internetwache/GitTools
vim wp-config.php
creates a temporary file .wp-config.php.swp
wget https://example.com/.wp-config.php.swp
wget https://example.com/%23wp-config.php%23
wget https://example.com/wp-config.php~
wget https://example.com/dump.sql
wget https://example.com/example.com.key
I googled for instructions on how to check whether certificates and keys match.
There were dozends of howtos - and almost all of them were wrong.
wget https://example.com/server-status
wget http://ask.com/server-status
Golem, 2017-04-07
wget https://example.com/core
Hanno's blog, 2017-06-15
wget https://example.com/sftp-config.json
<script type="text/javascript" src="https://example.org/fancy.js"></script>
Allow: ,GET,,,POST,OPTIONS,HEAD,, Allow: POST,OPTIONS,,HEAD,:09:44 GMT Allow: GET,HEAD,OPTIONS,,HEAD,,HEAD,,HEAD,, HEAD,,HEAD,,HEAD,,HEAD,POST,,HEAD,, HEAD,!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" Allow: GET,HEAD,OPTIONS,=write HTTP/1.0,HEAD,,HEAD,POST,,HEAD,TRACE
Optionsbleed was already discovered in 2014, but nobody noticed it's a security problem.
One month after Heartbleed!
Dear Network Manager :
This warning is from the Financial Security Institute(FSI) of Korea.
Our job is to protect Korean financial organizations from illegal intrusion attacks.
We have received a report of unauthorized access trial originating from your site as shown below.
--------------------------------------------------------------------------------
Date/Time(GMT+9): 2017/03/11 06:54:53 ~ 2017/03/11 06:58:10
Source IP : [removed]
Destination IP : [removed],[removed]
Attack Type : F-SCN-WEB-170305-GitRepository_scan_attempt
--------------------------------------------------------------------------------
We are seriously considering notifying these illegal attempts to the related authorities of both your and our countries and requesting proper legal actions.
So, please take appropriate measures to identify and stop the attacker. And, please inform us of the results. ([removed])
Thank you for your cooperation.
p.s. : If you are not the correct person to deal with this incident, please forward this to the proper person and inform us for future convenience
To whom it may concern,
I'm a security manager of CERT-WFG (Computer Emergency Response Team for Woori Financial Group) and this is an official warning message against unauthorized access trial from IP addresses you manage.
We perform 24/7 security monitoring, threat assessment, investigation and response for threats or attacks to protect information asset of Woori Financial Group.
We have received an unauthorized access trial report from our information security systems as shown below:
Time of attack Attacker Victim Name of Attack
2017-03-10 17:27 [removed] [removed] UD_SVN1
The infrastructure of Woori Financial Group is classified as "National Security Objective Facility - class A" and unauthorized access to this facility is strictly prohibited by related laws and regulations. Therefore, this access trial will be regarded as an illegal attack against foreign nation's critical infrastructure. Please take the appropriate steps to identify the source of this trial and make sure this trial is stopped immediately and no more occurred again. In addition, please inform us of whole information about this. If you are not the correct person for this matter, please forward this e-mail to the person who is in charge of IT Security.
Sincerely Yours.
CERT-WFG Address : Woori Financial Group IT Center, 1585, Sangam-dong, Mapo-gu, Seoul, The Republic of Korea