Member-only story
How to Easily Find Exposed Credentials in Bug Hunting
Earn rewards with this simple method.

📩 Read the article for free CLICK HERE.
Hi, I’m Rivek Raj Tamang (RivuDon), a Security Researcher, Bug Hunter, and an Ethical Hacker currently pursuing a Master’s in Cybersecurity. I have secured many companies, received bounty and numerous Hall of Fames and Letter of Appreciation / Recognition.
Feel free to connect and get in touch with me, you can find out more about me on my LinkedIn, I am active there.
Hi readers, this write-up is a quick guide one on how I found Exposed Credentials of company internals on third party exposures via Google Dorking. People usually miss this, as it is not directly related to the main domain while Google Dorking.
So, without further ado let’s get straight to it!
The Target
After finishing my hunt on the previous target, I was looking for a new target to hunt on, which is responsive, does not take long to communicate and awards a Hall of Fame or some sort of reward.
This is quite hard to find, sometimes some programs don’t even reply, and only realize it after spending a lot of time finding a bug on it and you keep waiting forever even after so many follow up emails.