Member-only story
$50-$100 worth Sensitive Leaks via Google Dorks | Part 2
Part 2: Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.
Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:

Google Dorking
While we automate all our asset discovery and low hanging bugs using existing tools and scripts, they are no doubt the best option to use but some sensitive files, leaks, passwords and hidden assets need our manual attention. Read the full write-up to know about the practical techniques on how you can work manually to find these files, leaks and assets.
Note: I will use either “*.com” or without mentioning any target. The reason for this is, it is impossible to get the results of each and every dork mentioned below in a single target. So, just for explaination I have used these to showcase the output results. “*.com” signifies searching in all the websites with TLD “.com” and not specifying any “site:target.com” dork instructs…