BOOK THIS SPACE FOR AD
ARTICLE ADHello everyone, This is my 6th Blog first about Bugs and Bug bounty
There are a lot of bugs but one which is a little easy to find without much technical expertise is Sensitive Information Disclosure.
Overview of this Vulnerability
This is a vulnerability where some information which is very sensitive/critical/confidential is publicly available or disclosed where it shouldn’t be. For Example,
This is one example of the vulnerability where the Sensitive Information like DB_USERNAME, DB_PASSWORD is disclosed Publicly.
So finally the reason you are reading this -> The DORKS
These are below DORKS:
site:example.com intext:"username" intext:"password" -gitsite:example.com filetype:txt OR filetype:log "username" OR "password"site:example.com inurl:admin OR inurl:login OR inurl:portalsite:pastebin.com "password" OR "login" OR "credentials"site:example.com filetype:env "DB_PASSWORD=" OR "DB_USER="site:example.com filetype:json "AWS_ACCESS_KEY_ID=" OR "AWS_SECRET_ACCESS_KEY="site:example.com filetype:config "password=" OR "apikey="site:example.com filetype:pem OR filetype:key "BEGIN RSA PRIVATE KEY"site:example.com "BEGIN OPENSSH PRIVATE KEY"