Submit Search
Upload
Exploiting publically exposed Version Control System
•
2 likes
•
5,179 views
Anant Shrivastava
Follow
This Demo / talk was focused on exploiting publicly exposed version control system.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 16
Download now
Download to read offline
Recommended
Slides null puliya linux basics
Slides null puliya linux basics
Anant Shrivastava
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Anant Shrivastava
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
Android Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) Professionals
Anant Shrivastava
Web Application firewall-Mod security
Web Application firewall-Mod security
Romansh Yadav
Down by the Docker
Down by the Docker
NotSoSecure Global Services
Mod security
Mod security
Shruthi Kamath
Recon
Recon
UTD Computer Security Group
Recommended
Slides null puliya linux basics
Slides null puliya linux basics
Anant Shrivastava
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Anant Shrivastava
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
Android Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) Professionals
Anant Shrivastava
Web Application firewall-Mod security
Web Application firewall-Mod security
Romansh Yadav
Down by the Docker
Down by the Docker
NotSoSecure Global Services
Mod security
Mod security
Shruthi Kamath
Recon
Recon
UTD Computer Security Group
Apache Struts2 CVE-2017-5638
Apache Struts2 CVE-2017-5638
Riyaz Walikar
Network Security
Network Security
UTD Computer Security Group
Windows Security Crash Course
Windows Security Crash Course
UTD Computer Security Group
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
🏆Ruben Cocheno💭
Ruby and Framework Security
Ruby and Framework Security
Creston Jamison
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
Indonesia Network Operators Group
Nessus Basics
Nessus Basics
amiable_indian
Powershell'in Karanlık Yüzü
Powershell'in Karanlık Yüzü
Halil Dalabasmaz
IPv6 for Pentesters
IPv6 for Pentesters
NotSoSecure Global Services
Ossec Lightning
Ossec Lightning
wremes
Hack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSEC
Mayank Gaikwad
IOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H Meet
Anthony Jose
nessus
nessus
Muhammad Yasin
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
clevernetsystemsgeneva
How to secure nginx server using fail2ban on Centos-7
How to secure nginx server using fail2ban on Centos-7
Bhadreshsinh Gohil
Isa
Isa
deshvikas
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Implementing ossec
Implementing ossec
Jeronimo Zucco
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
My tryst with sourcecode review
My tryst with sourcecode review
Anant Shrivastava
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Anant Shrivastava
More Related Content
What's hot
Apache Struts2 CVE-2017-5638
Apache Struts2 CVE-2017-5638
Riyaz Walikar
Network Security
Network Security
UTD Computer Security Group
Windows Security Crash Course
Windows Security Crash Course
UTD Computer Security Group
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
🏆Ruben Cocheno💭
Ruby and Framework Security
Ruby and Framework Security
Creston Jamison
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
Indonesia Network Operators Group
Nessus Basics
Nessus Basics
amiable_indian
Powershell'in Karanlık Yüzü
Powershell'in Karanlık Yüzü
Halil Dalabasmaz
IPv6 for Pentesters
IPv6 for Pentesters
NotSoSecure Global Services
Ossec Lightning
Ossec Lightning
wremes
Hack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSEC
Mayank Gaikwad
IOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H Meet
Anthony Jose
nessus
nessus
Muhammad Yasin
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
clevernetsystemsgeneva
How to secure nginx server using fail2ban on Centos-7
How to secure nginx server using fail2ban on Centos-7
Bhadreshsinh Gohil
Isa
Isa
deshvikas
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Implementing ossec
Implementing ossec
Jeronimo Zucco
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
What's hot
(20)
Apache Struts2 CVE-2017-5638
Apache Struts2 CVE-2017-5638
Network Security
Network Security
Windows Security Crash Course
Windows Security Crash Course
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
Ruby and Framework Security
Ruby and Framework Security
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
Nessus Basics
Nessus Basics
Powershell'in Karanlık Yüzü
Powershell'in Karanlık Yüzü
IPv6 for Pentesters
IPv6 for Pentesters
Ossec Lightning
Ossec Lightning
Hack wifi password using kali linux
Hack wifi password using kali linux
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSEC
IOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H Meet
nessus
nessus
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
How to secure nginx server using fail2ban on Centos-7
How to secure nginx server using fail2ban on Centos-7
Isa
Isa
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Implementing ossec
Implementing ossec
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Viewers also liked
My tryst with sourcecode review
My tryst with sourcecode review
Anant Shrivastava
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Anant Shrivastava
Snake bites : Python for Pentesters
Snake bites : Python for Pentesters
Anant Shrivastava
OWASP Bangalore : OWTF demo : 13 Dec 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Anant Shrivastava
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
Anant Shrivastava
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Anant Shrivastava
Career In Information security
Career In Information security
Anant Shrivastava
Raspberry pi Beginners Session
Raspberry pi Beginners Session
Anant Shrivastava
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
Anant Shrivastava
Web2.0 : an introduction
Web2.0 : an introduction
Anant Shrivastava
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
Avr introduction
Avr introduction
Anant Shrivastava
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
Radare2 - An Introduction by Anto Joseph
Radare2 - An Introduction by Anto Joseph
Anthony Jose
Grinder talk
Grinder talk
n|u - The Open Security Community
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
n|u - The Open Security Community
Threat intelligence - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
n|u - The Open Security Community
Csp july2015
Csp july2015
n|u - The Open Security Community
Netcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
Chandrapal Badshah
Viewers also liked
(20)
My tryst with sourcecode review
My tryst with sourcecode review
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Snake bites : Python for Pentesters
Snake bites : Python for Pentesters
OWASP Bangalore : OWTF demo : 13 Dec 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Career In Information security
Career In Information security
Raspberry pi Beginners Session
Raspberry pi Beginners Session
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
Web2.0 : an introduction
Web2.0 : an introduction
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Avr introduction
Avr introduction
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Radare2 - An Introduction by Anto Joseph
Radare2 - An Introduction by Anto Joseph
Grinder talk
Grinder talk
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
Csp july2015
Csp july2015
Netcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
Similar to Exploiting publically exposed Version Control System
Continuous Security
Continuous Security
Sysdig
Swift Install Workshop - OpenStack Conference Spring 2012
Swift Install Workshop - OpenStack Conference Spring 2012
Joe Arnold
Linux
Linux
Kavi Bharathi R
Deploy your Python code on Azure Functions
Deploy your Python code on Azure Functions
Dhilipsiva DS
Assisted-Installer-DevConf-US-2021
Assisted-Installer-DevConf-US-2021
Nir Magnezi
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
Freddy Rolland
Android memory analysis Debug slides.pdf
Android memory analysis Debug slides.pdf
VishalKumarJha10
PVS-Studio in the Clouds: Travis CI
PVS-Studio in the Clouds: Travis CI
Andrey Karpov
Rolling upgrade OpenStack
Rolling upgrade OpenStack
Vietnam Open Infrastructure User Group
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in Kubernetes
Sysdig
Kali kinux1
Kali kinux1
Mohammad Mafi
Android Boot Time Optimization
Android Boot Time Optimization
Kan-Ru Chen
Baylisa - Dive Into OpenStack
Baylisa - Dive Into OpenStack
Jesse Andrews
Introduction to Docker
Introduction to Docker
Nissan Dookeran
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Ondrej Holecek
Trying and evaluating the new features of GlusterFS 3.5
Trying and evaluating the new features of GlusterFS 3.5
Keisuke Takahashi
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Nicolas Collery
Startup guide for kvm on cent os 6
Startup guide for kvm on cent os 6
Carlos Eduardo
Containerizing your Security Operations Center
Containerizing your Security Operations Center
Jimmy Mesta
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware Analysis
Tamas K Lengyel
Similar to Exploiting publically exposed Version Control System
(20)
Continuous Security
Continuous Security
Swift Install Workshop - OpenStack Conference Spring 2012
Swift Install Workshop - OpenStack Conference Spring 2012
Linux
Linux
Deploy your Python code on Azure Functions
Deploy your Python code on Azure Functions
Assisted-Installer-DevConf-US-2021
Assisted-Installer-DevConf-US-2021
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
Android memory analysis Debug slides.pdf
Android memory analysis Debug slides.pdf
PVS-Studio in the Clouds: Travis CI
PVS-Studio in the Clouds: Travis CI
Rolling upgrade OpenStack
Rolling upgrade OpenStack
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in Kubernetes
Kali kinux1
Kali kinux1
Android Boot Time Optimization
Android Boot Time Optimization
Baylisa - Dive Into OpenStack
Baylisa - Dive Into OpenStack
Introduction to Docker
Introduction to Docker
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Trying and evaluating the new features of GlusterFS 3.5
Trying and evaluating the new features of GlusterFS 3.5
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Startup guide for kvm on cent os 6
Startup guide for kvm on cent os 6
Containerizing your Security Operations Center
Containerizing your Security Operations Center
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware Analysis
More from Anant Shrivastava
Diverseccon keynote: My 2 Paisa's on Infosec World
Diverseccon keynote: My 2 Paisa's on Infosec World
Anant Shrivastava
WhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom rom
Anant Shrivastava
Security Issues in Android Custom ROM
Security Issues in Android Custom ROM
Anant Shrivastava
Web application finger printing - whitepaper
Web application finger printing - whitepaper
Anant Shrivastava
Battle Underground NullCon 2011 Walkthrough
Battle Underground NullCon 2011 Walkthrough
Anant Shrivastava
Nullcon Hack IM 2011 walk through
Nullcon Hack IM 2011 walk through
Anant Shrivastava
Embedded Systems : introduction
Embedded Systems : introduction
Anant Shrivastava
introduction to Lamp Stack
introduction to Lamp Stack
Anant Shrivastava
Logic Families Electronics
Logic Families Electronics
Anant Shrivastava
Filesystem
Filesystem
Anant Shrivastava
basic knowhow hacking
basic knowhow hacking
Anant Shrivastava
More from Anant Shrivastava
(11)
Diverseccon keynote: My 2 Paisa's on Infosec World
Diverseccon keynote: My 2 Paisa's on Infosec World
WhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom rom
Security Issues in Android Custom ROM
Security Issues in Android Custom ROM
Web application finger printing - whitepaper
Web application finger printing - whitepaper
Battle Underground NullCon 2011 Walkthrough
Battle Underground NullCon 2011 Walkthrough
Nullcon Hack IM 2011 walk through
Nullcon Hack IM 2011 walk through
Embedded Systems : introduction
Embedded Systems : introduction
introduction to Lamp Stack
introduction to Lamp Stack
Logic Families Electronics
Logic Families Electronics
Filesystem
Filesystem
basic knowhow hacking
basic knowhow hacking
Recently uploaded
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
Paolo Missier
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
WSO2
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
danishmna97
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Kumar Satyam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
API Governance and Monetization - The evolution of API governance
API Governance and Monetization - The evolution of API governance
WSO2
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
AnitaRaj43
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard37
Recently uploaded
(20)
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
API Governance and Monetization - The evolution of API governance
API Governance and Monetization - The evolution of API governance
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
Exploiting publically exposed Version Control System
1.
EXPLOITING VERSION CONTROL SYSTEMS PILLAGING
FOR FUN AND PROFIT BY ANANT SHRIVASTAVA
2.
ANANT SHRIVASTAVA Information Security
Consultant Admin - Dev - Security null + OWASP + G4H and @anantshri Trainer : Blackhat USA, NullCon, g0s, c0c0n, RootConf Speaker : Nullcon, c0c0n, ClubHack, RootConf http://anantshri.info
3.
WHAT IS VCS Version
Control System The hip / developers way of deploying code Supports Auto-Deployment on commit
4.
WHY EXPLOIT Coz its
fun Its like a golden ticket Auto-deployment if available makes it more hip.
5.
VCS 101 Type FOLDER GIT
.git SVN .svn Mercurial .hg
6.
PREDICATABLE FILES .git/HEAD .hg/requires .bzr/README
7.
ROBOTS.TXT OF VCS .gitignore
8.
TOOLS 1. SVN-extractor (Only
SVN) (on top coz i wrote it) 2. DVCS-pillage (lacks SVN support) 3. dvcs-ripper (alternative implementation covers svn too)
9.
DEMO TIME NOTE: ALL
DEMO's are prepared while in sleep deprived state.
10.
DIRECTORY LISTING ENABLED
11.
DIRECTORY LISTING DISABLED
12.
SVN
13.
PHEW DEMO DONE
14.
QUICK CHECKS while read
p; do echo "Input: "$p echo "CHECK: SVN entries http" curl -I echo "CHECK: SVN entries https" curl -k -I echo "CHECK: SVN wcdb" curl -I echo "CHECK: SVN wcdb https" curl -k -I done<$1 http://$p/.svn/entries https://$p/.svn/entries http://$p/.svn/wc.db https://$p/.svn/wc.db
15.
ANY QUESTIONS
16.
ANANT SHRIVASTAVA Information Security
Consultant Admin - Dev - Security null + OWASP + G4H and @anantshri Trainer : Blackhat USA, NullCon, g0s, c0c0n, RootConf Speaker : Nullcon, c0c0n, ClubHack, RootConf http://anantshri.info
Download now