In this post, I introduce some sensitive information- passwords usingGooglee dorks. This technique would help you in various phases of your penetration test.1.ext:sql intext:username intext:password This piece of query retrieve the clear text password of database files.ex:

mysql> SELECT FROM userss;+--------+-------------------+------------+| userid | username | password |+--------+-------------------+------------+| 1 | Barack Obama | TopSecret | | 2 | Angela Merkel | D-Mark | | 3 | Lula da Silva | sAmBa | | 4 | Fidel Castro | el Che | | 5 | Silvio Berlusconi | ruby | +--------+-------------------+------------+5 rows in set (0.00 sec)So this is an example result of x-site...so just cross your fingers for more sensitive information.2.filetype:txt username password email This will retry txt files containing username, password, and email information.ex:ontrol Panel: https://x.com:2083 Username: foclient Domain: xxxxxxxxxxxxx.in Password: Z9KF7c7BZgct 1st Nameserver: xxxx.hostgator.com 2nd Nameserver: xxx.hostgator.com Server IP: xx.xx.xxx.xxx Customize dorks yourself for more interesting sensitive information. Thanks happy hunting...

Building a Security Team
June 27, 2023
Digital Forensics and Incident Response: What It Is, When You Need It, and How to Implement It
A quick guide to digital forensics and incident response (DFIR): what it is, when it’s needed, how to implement a cutting-edge program, and how to develop DFIR skills on your team.