InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

Member-only story

$50-$100 worth Sensitive Leaks via Google Dorks | Part 2

Part 2: Learn practical and hidden dorks to target sensitive bounty earning leaks and sensitive files.

Friend Link | Free Link

Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:

Bug Bounty Hunting Series

30 stories
Credit: Gemini — Imagen

Google Dorking

While we automate all our asset discovery and low hanging bugs using existing tools and scripts, they are no doubt the best option to use but some sensitive files, leaks, passwords and hidden assets need our manual attention. Read the full write-up to know about the practical techniques on how you can work manually to find these files, leaks and assets.

Note: I will use either “*.com” or without mentioning any target. The reason for this is, it is impossible to get the results of each and every dork mentioned below in a single target. So, just for explaination I have used these to showcase the output results. “*.com” signifies searching in all the websites with TLD “.com” and not specifying any “site:target.com” dork instructs

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by It4chis3c

Security Researcher | Bug Bounties | Tips & Tricks

No responses yet

Write a response