Find Amazon Buckets & Sensitive Cloud Storage Data Using Google Dorks

Google dork queries are essential in any bug bounty hunters tool kit. Using the dorks below you can find sensitive information in an unsecured website’s cloud storage.

site:http://drive.google.com “targetweb[.]com”

site:http://blob.core.windows.net “targetweb[.]com”

site:http://googleapis.com “targetweb[.]com”

site:http://s3.amazonaws.com “targetweb[.]com”

More Google dorks can be found at: https://www.exploit-db.com/google-hacking-database

Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *