Docs

Dokumentasi teknis untuk penetration testing dan security research.

GitLab Post-Exploitation

Daftar Isi Bab 1 — Post-Exploitation setelah Account Takeover 1.1 Prerequisite 1.2 Generate Personal Access Token 1.3 Reconnaissance via Admin Panel 1.4 RCE via Server-Side Git Hooks (GitLab EE) 1.5 RCE via CI/CD Pipeline (jika ada Runner) 1.6 RCE tanpa Runner — Authenticated CVE 1.7 SSRF via Webhook 1.8 Extract Secrets (CI Variables, Repos, Snippets) 1.9 Cloud Metadata Pivot 1.10 Persistence 1.11 Prioritas Jalur Eksploitasi Bab 2 — Privilege Escalation Linux 2.1 Situasi Awal 2.2 Stabilkan Shell 2.3 Enumerasi Otomatis 2.4 SUID / SGID Binaries 2.5 Sudo Misconfig 2.6 Cron Jobs 2.7 Writable Files & Services 2.8 Capabilities 2.9 Kernel Exploit 2.10 Docker / Container Escape 2.11 GitLab-Specific Privesc 2.12 Checklist Ringkasan Bab 3 — Pivoting ke Internal Network 3.1 Situasi Awal 3.2 Network Discovery 3.3 Port Scanning dari Dalam 3.4 Tunneling & Port Forwarding 3.5 Pivot ke Database 3.6 Pivot ke Server Lain via SSH 3.7 Pivot ke Cloud Infrastructure 3.8 Lateral Movement via Credentials Reuse 3.9 Pivot Tools 3.10 Ringkasan Flow Pivoting Bab 1 — Post-Exploitation setelah Account Takeover 1.1 Prerequisite Sebelum melanjutkan, pastikan kamu sudah memiliki: ...

February 23, 2026 Reading: 23 min Authors:
  • Siti

Exposed Database Panels: Adminer & phpMyAdmin

Daftar Isi Bab 1 — Menemukan Panel yang Terekspos 1.1 Apa itu Adminer & phpMyAdmin 1.2 Mengapa Sering Terekspos 1.3 Dorking: Google 1.4 Dorking: Shodan 1.5 Dorking: FOFA / Censys / ZoomEye 1.6 Nuclei Templates 1.7 Manual Discovery via Path Bruteforce Bab 2 — Eksploitasi Adminer 2.1 Versi & Kerentanan 2.2 Default / Weak Credentials 2.3 CVE-2021-21311 — SSRF 2.4 Adminer File Read (Rogue MySQL Server) 2.5 Login tanpa Password (MySQL Empty Root) 2.6 Post-Login: Database ke Shell Bab 3 — Eksploitasi phpMyAdmin 3.1 Versi & Kerentanan 3.2 Default / Weak Credentials 3.3 CVE-2018-12613 — Local File Inclusion 3.4 CVE-2016-5734 — RCE via preg_replace 3.5 Post-Login: SQL Query ke Webshell 3.6 Post-Login: SELECT INTO OUTFILE 3.7 Post-Login: General Log Trick Bab 4 — Post-Exploitation 4.1 Dari Database Access ke Data Dump 4.2 Dari Database ke Shell (RCE) 4.3 Privilege Escalation dari MySQL User 4.4 Pivot ke Aplikasi Web 4.5 Checklist Ringkasan Bab 1 — Menemukan Panel yang Terekspos 1.1 Apa itu Adminer & phpMyAdmin Tool Deskripsi File Adminer Database management dalam 1 file PHP. Support MySQL, PostgreSQL, SQLite, MS SQL, Oracle adminer.php (single file) phpMyAdmin Web interface untuk MySQL/MariaDB. Lebih lengkap, lebih berat Folder /phpmyadmin/ Keduanya digunakan developer untuk mengelola database via browser. Masalahnya — sering lupa dihapus atau tidak dilindungi di production server. ...

February 23, 2026 Reading: 17 min Authors:
  • Siti

Exposed .env Files & JWT Exploitation

Daftar Isi Bab 1 — Exposed .env Files 1.1 Apa itu .env File 1.2 Mengapa Sering Terekspos 1.3 Dorking: Google 1.4 Dorking: Shodan / Censys / FOFA 1.5 Manual & Automated Discovery 1.6 Variasi Path & Filename 1.7 Parsing & Extracting Secrets 1.8 Exploitation per Secret Type 1.9 Laravel APP_KEY → RCE 1.10 Database Credentials → Data Access 1.11 Cloud Keys → Full Infrastructure 1.12 SMTP Credentials → Phishing / Account Takeover 1.13 Checklist .env Exploitation Bab 2 — JWT Exploitation 2.1 Apa itu JWT 2.2 Struktur JWT 2.3 Dimana JWT Ditemukan 2.4 Algorithm None Attack 2.5 Algorithm Confusion (RS256 → HS256) 2.6 Weak Secret Brute Force 2.7 JWT Secret dari .env / Source Code 2.8 KID Injection 2.9 JWK / JKU Header Injection 2.10 Expired Token Bypass 2.11 Privilege Escalation via JWT Claims 2.12 Tools 2.13 Checklist JWT Exploitation Bab 3 — Kombinasi: .env + JWT = Full Takeover 3.1 Flow Umum 3.2 Contoh Kasus: Laravel 3.3 Contoh Kasus: Node.js / Express 3.4 Contoh Kasus: Django / Flask 3.5 Dari JWT Admin ke RCE Bab 1 — Exposed .env Files 1.1 Apa itu .env File File .env menyimpan konfigurasi environment aplikasi. Isinya biasanya: ...

February 23, 2026 Reading: 16 min Authors:
  • Siti

Kubernetes Exposed Services & Post-Exploitation

Daftar Isi Bab 1 — Menemukan Kubernetes yang Terekspos 1.1 Apa itu Kubernetes & Attack Surface 1.2 Mengapa Sering Terekspos 1.3 Dorking: Shodan / Censys / FOFA 1.4 Nuclei & Automated Discovery 1.5 Manual Discovery per Service 1.6 Distribusi K8s — Attack Surface per Distro Bab 2 — Eksploitasi Kubernetes API Server 2.1 Anonymous Auth Check 2.2 Enumerasi tanpa Auth 2.3 Service Account Token Abuse 2.4 RBAC Misconfiguration 2.5 Secrets Extraction 2.6 Pod Creation → RCE Bab 3 — Eksploitasi etcd, Kubelet, Dashboard 3.1 etcd Tanpa Auth 3.2 Kubelet API (10250) 3.3 Kubernetes Dashboard Tanpa Auth 3.4 Helm Tiller (Legacy) Bab 4 — Container & Pod Escape 4.1 Privileged Pod → Host Access 4.2 HostPath Mount 4.3 Service Account Token → API Access 4.4 Cloud Metadata dari Pod 4.5 Node Pivot via Kubelet Bab 5 — Post-Exploitation & Lateral Movement 5.1 Enumerate Semua Namespace & Workload 5.2 Secret Extraction → Credentials 5.3 Pivot ke Node Lain 5.4 Cloud Credential Theft dari Pod 5.5 Checklist Ringkasan Bab 1 — Menemukan Kubernetes yang Terekspos 1.1 Apa itu Kubernetes & Attack Surface Kubernetes (K8s) adalah platform orkestrasi container. Arsitekturnya terdiri dari beberapa komponen yang masing-masing punya port dan API sendiri: ...

February 26, 2026 Reading: 26 min Authors:
  • Siti

Ansible & AWX/Semaphore Exploitation

Daftar Isi Bab 1 — Menemukan Ansible Interfaces yang Terekspos 1.1 Apa itu Ansible, AWX, Semaphore 1.2 Mengapa Sering Terekspos 1.3 Dorking: Google / Shodan / FOFA 1.4 Default Credentials 1.5 Manual & Automated Discovery Bab 2 — Eksploitasi AWX / Ansible Tower 2.1 Default Credentials & Brute Force 2.2 API Exploration 2.3 RCE via Job Template 2.4 Credential Extraction via API 2.5 Inventory & Host Enumeration 2.6 Eksploitasi Semaphore UI Bab 3 — Eksploitasi Ansible Vault & Files 3.1 Exposed Ansible Files 3.2 Ansible Vault Cracking 3.3 Plaintext Passwords di Playbooks & Vars 3.4 SSH Key Extraction 3.5 Inventory File Analysis 3.6 Ansible Artifacts di Compromised Host 3.7 Ansistrano & Deployment Role Artifacts Bab 4 — Post-Exploitation via Ansible 4.1 RCE ke Semua Managed Hosts 4.2 Credential Harvesting dari Managed Hosts 4.3 Backdoor Deployment via Playbook 4.4 Lateral Movement via Inventory 4.5 Checklist Ringkasan Bab 1 — Menemukan Ansible Interfaces yang Terekspos 1.1 Apa itu Ansible, AWX, Semaphore Tool Deskripsi Port Default Ansible Automation tool untuk config management, deployment, orkestrasi. Agentless (pakai SSH) Tidak ada (CLI tool) AWX Open-source web UI & API untuk Ansible. Upstream project dari Ansible Tower 8052 (HTTP), 8043 (HTTPS) Ansible Tower Versi enterprise (berbayar) dari AWX. Red Hat product 443 (HTTPS) Semaphore Lightweight open-source UI untuk Ansible 3000 (HTTP) Mengapa ini berbahaya: ...

February 26, 2026 Reading: 28 min Authors:
  • Siti

Path Traversal & Local File Inclusion (LFI)

Daftar Isi Bab 1 — Dasar Path Traversal & LFI 1.1 Apa itu Path Traversal / Directory Traversal 1.2 Apa itu LFI (Local File Inclusion) 1.3 Mengapa Terjadi — Root Cause 1.4 Basic Payloads 1.5 File Target Utama di Linux 1.6 File Target Utama di Windows 1.7 Parameter yang Sering Rentan 1.8 Dorking: Google / Shodan / FOFA 1.9 Tools Discovery Bab 2 — Bypass Techniques 2.1 URL Encoding 2.2 Double Encoding 2.3 Null Byte Injection 2.4 Path Normalization Bypass 2.5 Unicode / UTF-8 Encoding 2.6 PHP Wrapper Abuse 2.7 WAF Bypass Techniques 2.8 OS-Specific Tricks 2.9 Wordlist & Burp Intruder Setup Bab 3 — LFI to RCE 3.1 Log Poisoning — Apache / Nginx 3.2 Log Poisoning — SSH Auth Log 3.3 Log Poisoning — Mail Log 3.4 /proc/self/environ 3.5 /proc/self/fd/ Technique 3.6 PHP Session File Inclusion 3.7 Uploaded File Inclusion 3.8 PHP Wrappers to RCE 3.9 XSLT Injection via PHP 3.10 XXE (XML External Entity) Injection 3.11 RCE Checklist Bab 4 — Target-Specific Cases 4.1 PHP — Laravel 4.2 PHP — WordPress 4.3 PHP — Joomla & Drupal 4.4 Java / Tomcat 4.5 Node.js 4.6 Python / Flask / Django 4.7 Nginx Alias Traversal 4.8 Apache Misconfiguration 4.9 IIS / Windows Specific 4.10 API Endpoints (REST & GraphQL) 4.11 SSRF + LFI Chain — Cloud Metadata 4.12 CVE Reference Bab 5 — Post-Exploitation via Path Traversal 5.1 Credential Extraction 5.2 Source Code Disclosure 5.3 SSH Key & Private Key Theft 5.4 Lateral Movement dari File Read 5.5 Chaining LFI ke RCE ke Shell 5.6 Checklist Ringkasan Bab 1 — Dasar Path Traversal & LFI 1.1 Apa itu Path Traversal / Directory Traversal Path traversal (directory traversal) adalah vulnerability di mana input dari user dipakai dalam operasi file tanpa sanitasi yang benar, sehingga attacker bisa navigasi keluar dari direktori yang seharusnya menggunakan sequence ../: ...