Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dehashed passwords not alongside the username they should match #1044

Closed
Cyb3rC3lt opened this issue Jan 31, 2024 · 6 comments
Closed

Dehashed passwords not alongside the username they should match #1044

Cyb3rC3lt opened this issue Jan 31, 2024 · 6 comments
Assignees
Labels
enhancement New feature or request

Comments

@Cyb3rC3lt
Copy link

Describe the bug
Dehashed passwords come back in random order

Expected behavior
Dehashed passwords come back alongside the username

BBOT Command
Example: bbot -t test.com -f email-enum

I would have hoped that the passwords would be returned alongside the actual username it belongs to but it doesnt so it becomes not very useful. I checked this by querying for an individual too on dehashed then searched the bbot output for the password and it was nowhere near the email address. Unless I am missing a flag or something.....

image

@Cyb3rC3lt Cyb3rC3lt added the bug Something isn't working label Jan 31, 2024
@TheTechromancer
Copy link
Collaborator

Every event raised by BBOT has a source/parent event. The parent of password and hash events is the associated email address.

This can be seen in Neo4j.

251008694-0192d548-5c60-42b6-9a1e-32ba7b921cdf.png

Where you could do something like this to see the relationship between emails and passwords:

MATCH (e:EMAIL_ADDRESS)->(p:PASSWORD) RETURN e,p

If you don't want to use Neo4j, you can still correlate them using the source attribute in output.ndjson. On a practical note, I realize this is kind of annoying to have to do. We should probably include the email address in the data for these types of events. @SpamFaux might have thoughts.

@TheTechromancer TheTechromancer added enhancement New feature or request and removed bug Something isn't working labels Jan 31, 2024
@Cyb3rC3lt
Copy link
Author

Cyb3rC3lt commented Jan 31, 2024

The NEO4J is very cool, must try that, hadn't realised you could do that. This is such a powerful tool!

Whilst I have you guys and although it is slightly off topic but when you get Postman requests back in the output with things like:

{'host': 'www.postman.com', 'description': 'Possible secret in JS [password="password123,(KS"] Signature [possible_creds_var]', 'url': 'https://www.postman.com/_api/request/coderemovedhere'} httpx->excavate (distance-1)

When I look at the postman link it has a url of: "url":"localhost:8091/api/v1/journals/refunds/transactions?serviceName=CA SnAPI PDQ Payment Poller 1

Where were these requests sent to and what are these passwords for?
Maybe Neo4j is the answer here too....
Thanks

@TheTechromancer
Copy link
Collaborator

Where were these requests sent to and what are these passwords for?

Events from postman are the result of a search on postman.com for the target domain. If you look in the body of the response, somewhere you should see your target or something closely matching it.

Recently there have been some false positives for postman but we have been working to fix them. There is a bugfix already in dev that should make its way into stable soon.

@Cyb3rC3lt
Copy link
Author

Thank you, just checked on postman.com and I can see where the requests came from now. Maybe it was affiliates of my target that postman picked up as the request seems to go to them.

@TheTechromancer
Copy link
Collaborator

Fix has been merged :)

image

To benefit, make sure to use the bleeding edge version.

@Cyb3rC3lt
Copy link
Author

Excellent, very quick turnaround, thanks very much

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants