-
Notifications
You must be signed in to change notification settings - Fork 564
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dehashed passwords not alongside the username they should match #1044
Comments
Every event raised by BBOT has a source/parent event. The parent of password and hash events is the associated email address. This can be seen in Neo4j. Where you could do something like this to see the relationship between emails and passwords: MATCH (e:EMAIL_ADDRESS)->(p:PASSWORD) RETURN e,p If you don't want to use Neo4j, you can still correlate them using the |
The NEO4J is very cool, must try that, hadn't realised you could do that. This is such a powerful tool! Whilst I have you guys and although it is slightly off topic but when you get Postman requests back in the output with things like: {'host': 'www.postman.com', 'description': 'Possible secret in JS [password="password123,(KS"] Signature [possible_creds_var]', 'url': 'https://www.postman.com/_api/request/coderemovedhere'} httpx->excavate (distance-1) When I look at the postman link it has a url of: "url":"localhost:8091/api/v1/journals/refunds/transactions?serviceName=CA SnAPI PDQ Payment Poller 1 Where were these requests sent to and what are these passwords for? |
Events from postman are the result of a search on postman.com for the target domain. If you look in the body of the response, somewhere you should see your target or something closely matching it. Recently there have been some false positives for postman but we have been working to fix them. There is a bugfix already in dev that should make its way into stable soon. |
Thank you, just checked on postman.com and I can see where the requests came from now. Maybe it was affiliates of my target that postman picked up as the request seems to go to them. |
Fix has been merged :) To benefit, make sure to use the bleeding edge version. |
Excellent, very quick turnaround, thanks very much |
Describe the bug
Dehashed passwords come back in random order
Expected behavior
Dehashed passwords come back alongside the username
BBOT Command
Example:
bbot -t test.com -f email-enum
I would have hoped that the passwords would be returned alongside the actual username it belongs to but it doesnt so it becomes not very useful. I checked this by querying for an individual too on dehashed then searched the bbot output for the password and it was nowhere near the email address. Unless I am missing a flag or something.....
The text was updated successfully, but these errors were encountered: