google-dorking

3 articles
sort: new top best
clear filter
0 4/10

Article describes using Google dorking techniques as a reconnaissance method to discover hidden vulnerabilities and exposed information for bug bounty hunting.

medium.com · loopXvedant · 19 hours ago · details
0 5/10

A bug bounty hunter discovered a DOM-based XSS vulnerability by using Google dorking to find interesting endpoints, then identifying that user input after the URL fragment (#) was being reflected into an IFRAME tag without proper sanitization, allowing injection of JavaScript payloads.

Abdelfattah Ibrahim
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 6/10

A researcher discovered a URI-based XSS vulnerability in a redirect parameter (example.com/social?redirect=) using Google dorking to find hidden endpoints, exploiting javascript:// protocol handling to execute arbitrary JavaScript when users logged in after being redirected to a malicious URL.

Jatin Nandwana HackerOne Google Hacking Database Exploit-DB
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details