Queries can be simple like uberinternal.com
or can contain multi-word strings like "Authorization: Bearer"
. Searches can even target specific files (filename: vim_settings.xml
) or specific languages (language:SQL
). Searches can also contain certain boolean qualifiers like NOT
and >
.
通过vim_settings.xml
部分类似
- SaaS API keys - Companies rarely impose IP restrictions on APIs. AWS, Slack, Google, and other API keys are liquid gold. These are usually found in config files, bash history files, and scripts.
- Server/database credentials - These are usually behind a firewall, so they’re less impactful. Usually found in config files, bash history files, and scripts.
- Customer/employee information - These hide in XLSX, CSV, and XML files and range from emails all the way to billing information and employee performance reviews.
- Data science scripts - SQL queries, R scripts, and Jupyter projects can reveal sensitive information. These repos also tend to have “test data” files hanging around.
- Hostnames/metadata - The most common result. Most companies don’t consider this a vulnerability, but they can help refine future searches
通过正则去search