How I Got Sensitive Directory Using Google Dorks

Ch4ndan das
2 min readAug 24, 2024

Hello everyone,

This is my first article. This article will talk about how to find information disclosure bug via google dorks. Let’s me introduce myself I’m Chandan das from India and I’m a web penetration tester.

Lets start !

The company didn’t want me to publish their name. For this reason, I’ll call it “redacted.com”. Let’s begin! I started hunting with some google dorks. ( site:redacted.com intitle:index.of) I found interesting directories.

You want more details of google dorking click hare ==> https://pentest-tools.com/information-gathering/google-hacking (for automation)

Then I click 2th website and I found dev.bz2 file download in my pc. Then open downloaded file (dev.bz 2) with winrar . I got the list of directories available with sensitive_data_exposure & disclosure_of_secrets. You can see in image .

Quickly I report this bug on bugcrowd after one day ago. I received reply from Bugcrowd this bug (P3) is valid But Duplicate.😞😞

Thank you everyone for Reading 🧡

U can view my LinkedIn Profile

Happy Hunting :)))

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Ch4ndan das
Ch4ndan das

Written by Ch4ndan das

Bug hunt3r | Penetration tester | Ethical Hack3r

No responses yet

Write a response