Abstract
This session will focus on how to exploit a scenario where Version control related data is publicly exposed.
what kind of juicy data can be extracted from the files as well as how you can leverage this for exploitation.
This session will focus on how to exploit a scenario where Version control related data is publicly exposed.
what kind of juicy data can be extracted from the files as well as how you can leverage this for exploitation.