June 21st, 2024

Simple ways to find exposed sensitive information

Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.

Read original articleLink Icon
Simple ways to find exposed sensitive information

The article discusses various methods to find exposed sensitive information, emphasizing the risks associated with Sensitive Data Exposure. Techniques such as search engine dorking, specifically crafted queries to uncover potentially sensitive data, are highlighted. Examples include searching for PDF documents with specific keywords or Excel files containing email addresses. The article also mentions using Github to search for accidentally committed sensitive information like API keys. PublicWWW, a code-level search engine, is suggested for finding hardcoded API keys in client-side JS snippets. Additionally, the article touches on the risks of misconfigured AWS S3 buckets leading to data exposure. It concludes by emphasizing the importance of keeping sensitive information confidential and highlights the impact of public disclosures through real-life examples and references to conference talks on data security. The author, Trickster Dev, focuses on code-level discussions related to web scraping, gray hat automation, growth hacking, and bounty hunting.

Related

Sloth search for Ruby Weekly – a 100 minute hack turned 20h open sauce project

Sloth search for Ruby Weekly – a 100 minute hack turned 20h open sauce project

Sloth Finder, a Ruby and Rails tool, curates niche articles on API and automation. It emphasizes simplicity, slow loading times, and plans to upgrade its tech stack for efficiency. Open source on GitHub.

KrebsOnSecurity Threatened with Defamation Lawsuit over Fake Radaris CEO

KrebsOnSecurity Threatened with Defamation Lawsuit over Fake Radaris CEO

KrebsOnSecurity faced a defamation lawsuit threat for exposing Radaris' true owners, the Lubarsky brothers, linked to questionable practices. Despite demands, KrebsOnSecurity stood by its reporting, revealing a complex web of interconnected businesses.

Vulnerability in Popular PC and Server Firmware

Vulnerability in Popular PC and Server Firmware

Eclypsium found a critical vulnerability (CVE-2024-0762) in Intel Core processors' Phoenix SecureCore UEFI firmware, potentially enabling privilege escalation and persistent attacks. Lenovo issued BIOS updates, emphasizing the significance of supply chain security.

Software Engineering Practices (2022)

Software Engineering Practices (2022)

Gergely Orosz sparked a Twitter discussion on software engineering practices. Simon Willison elaborated on key practices in a blog post, emphasizing documentation, test data creation, database migrations, templates, code formatting, environment setup automation, and preview environments. Willison highlights the productivity and quality benefits of investing in these practices and recommends tools like Docker, Gitpod, and Codespaces for implementation.

Arbitrary shell command evaluation in Org Mode (GNU Emacs)

Arbitrary shell command evaluation in Org Mode (GNU Emacs)

A vulnerability in Emacs Org mode allowed arbitrary shell command execution. A fix in Emacs 29.4 and Org 9.7.5 prevents unsafe code evaluation in link abbreviations, advising users to apply the patch.

Link Icon 5 comments
By @1970-01-01 - 5 months

     filetype:pdf site:hackerone.com "confidential"
Tip: Confidential docs should always be watermarked and never marked with embedded text for this very reason.
By @dizhn - 5 months
This made me think. How long before search engines flat out refuse such searches like LLMs do?
By @stuckkeys - 5 months
Cool blog. Been lurking on it for a while.
By @GEBEGB1001 - 5 months
Hi rl1987, how do I get involved in this space?