Posts

Showing posts from February, 2023

Reveal the Cloud with Google Dorks

Image
Find sensitive data in Amazon AWS, Google Cloud, and more Special Google searches called “ dorks ” can be used to reveal sensitive data and identify targets for bug bounty hunting and penetration testing . Cloud Storage Dorks Cloud storage services like Amazon S3, Microsoft Azure Blob Storage, Google Cloud, and Google Drive can often contain sensitive information . To find buckets and sensitive data, use the following dorks: site:s3.amazonaws.com "example.com" site:blob.core.windows.net "example.com" site:googleapis.com "example.com" site:drive.google.com "example.com" Add terms like confidential, privileged, not for public release to narrow your results. Bug Bounty Dorks To find Bug Bounty programs and Vulnerability Disclosure Programs (VDPs) , use the following dork: "submit vulnerability report" | "powered by bugcrowd" | "powered by hackerone" WordPress, Drupal, and Joomla Dorks Another use for Google Dorks...

What is Denial of Service through …

Image
Hello and welcome back guys. Today let us learn about Denial of service Web applications are meant to provide service to their users, be it e-commerce, banking, retail, entertainment, or any other service. If the web application is not providing the service it is meant to be, then it no longer has any purpose. So, what if the web application is forcefully stopped from providing the service it offers to its users. The company has to face the consequences. For example, let us take amazon. It is one of the busiest e-commerce platforms available out there. More than thousands of items are purchased around the globe in a single hour. So what if Amazon itself is not available for an hour. The whole world which lives on it will blackout for that hour, and all the services it provides like AWS, shopping, and Entertainment services will go down eventually. This is the biggest nightmare for any organization. Not being able to provide services is what every organization is worried about, as this ...