Credentials Hunting
While performing penetration testing, I found it time-consuming to search for credentials manually. Also, there are not many tools available to automate this process on victim machines. Therefore, this note exists to document commands to hunt for credentials on Linux systems.
Explanation focuses on useful find
and grep
commands to search for credentials:
1. Search for Common Credential Patterns
-
Basic keyword search:
Usegrep
to search recursively (-r
) for case-insensitive (-i
) terms like “password,” “secret,” or “token”:grep -rni 'password\|secret\|key\|token\|credential\|auth' /path/to/search
Explanation: This scans files for common credential-related keywords. Replace
/path/to/search
with directories like/home
,/etc
, or/var
. -
Base64-encoded strings:
Look for patterns resembling Base64 (common for encoded credentials):grep -rni '\([A-Za-z0-9+/]\{4\}\)\{3,\}\([A-Za-z0-9+/]\{2\}==\|[A-Za-z0-9+/]\{3\}=\)' /path
Explanation: Base64 strings often end with
=
or==
and have specific character patterns. -
Hex strings (e.g., API keys):
Search for 32, 40, or 64-character hex strings (common for keys like AWS, GitHub):grep -rni '\b[0-9a-fA-F]\{32\}\b\|\b[0-9a-fA-F]\{40\}\b\|\b[0-9a-fA-F]\{64\}\b' /path
Explanation: Hexadecimal strings of specific lengths often represent keys or hashes.
2. Target Specific File Types
-
Config files:
Search.conf
,.cfg
,.env
, or.yml
files for credentials:find / -type f \( -name "*.conf" -o -name "*.env" -o -name "*.yml" \) -exec grep -Hni 'password\|secret' {} \; 2>/dev/null
Explanation: Configuration files often store credentials in plaintext.
-
Scripts:
Check shell/Python scripts (.sh
,.py
) for hardcoded secrets:find / -type f \( -name "*.sh" -o -name "*.py" \) -exec grep -Hni 'api_key\|token' {} \; 2>/dev/null
-
Logs:
Search logs for accidental leaks (e.g.,auth
failures):
grep -rni 'login\|user=\|pass=' /var/log/
3. Check File Permissions
-
World-readable files:
Find files readable by everyone (potential credential leaks):find / -type f -perm /o=r -ls 2>/dev/null
Explanation: Poor permissions might expose sensitive files to unauthorized users.
-
Files named “credentials”:
Locate files with “credential” in their name:find / -type f -iname "*credential*" -ls 2>/dev/null
4. Search Hidden Files
-
Dotfiles:
Check hidden files (e.g.,.bash_history
,.git/config
):find / -type f -name ".*" -exec grep -Hni 'password\|ssh-key' {} \; 2>/dev/null
Explanation: Hidden files often store secrets like SSH keys or credentials.
5. Environment Variables
-
Credentials in startup scripts:
Look for exported credentials in shell profiles:grep -rni 'export [A-Z_][A-Z0-9_]*=.*' /etc/profile /etc/environment /home/*/.*rc
Explanation: Environment variables in
.bashrc
or/etc/environment
may contain secrets.
6. Database Credentials
-
Connection strings:
Search for database URLs (e.g.,postgresql://user:pass@host
):grep -rni '\(postgresql\|mysql\|mongodb\)://[^:]*:.*@' /path
-
Config files:
Find database config files likemy.cnf
or.pgpass
:find / -type f \( -name "my.cnf" -o -name ".pgpass" \) 2>/dev/null
7. SSH Keys
-
Private keys:
Locate SSH private keys (e.g.,id_rsa
,*.pem
):find / -type f \( -name "id_rsa" -o -name "*.pem" \) 2>/dev/null
Explanation: Private keys should never be publicly accessible.
8. Quick Scans
-
Common directories:
Focus on/etc
,/home
, and/opt
:find /etc /home /opt -type f -exec grep -Hni 'password\|secret' {} \; 2>/dev/null
Important Notes
- Suppress errors: Add
2>/dev/null
to hide “permission denied” errors. - Narrow your search: Replace
/
with specific directories (e.g.,/home/user
) to avoid scanning the entire system. - Review results carefully: False positives are common—verify findings before taking action.
- Ethical use: Only run these commands on systems you own or have explicit permission to audit.