1 00:00:01,780 --> 00:00:02,630 Hello, everyone. 2 00:00:02,980 --> 00:00:12,850 So in this video, we are going to discuss about Google Docs, so what actually are Google Docs? 3 00:00:13,330 --> 00:00:20,110 So if we split this word Google Plus doc. 4 00:00:22,100 --> 00:00:25,070 OK, so basically there are two words. 5 00:00:25,160 --> 00:00:29,090 The first is Google, we all know about what actually Google is. 6 00:00:29,720 --> 00:00:31,990 Google is a search engine. 7 00:00:33,200 --> 00:00:34,360 What is a dark now? 8 00:00:34,880 --> 00:00:42,620 So dark is basically a query that you search or query operator that you are hitting. 9 00:00:43,360 --> 00:00:54,740 For example, if you go on to Google and you search for by computer and head end up over here, your 10 00:00:54,740 --> 00:00:57,700 query is by computer, OK? 11 00:00:58,010 --> 00:01:00,140 And based on this, you are getting the results. 12 00:01:00,140 --> 00:01:01,460 As you can see or hear. 13 00:01:01,880 --> 00:01:03,800 The first result is of Amazon. 14 00:01:03,810 --> 00:01:07,370 I'm not counting these results because these are sponsored results. 15 00:01:07,910 --> 00:01:12,620 So the first result that we are getting is for Amazon and then Flipkart and then again, Flipkart. 16 00:01:12,620 --> 00:01:15,170 And chromo, if you look closely into the. 17 00:01:15,170 --> 00:01:15,610 You are. 18 00:01:15,890 --> 00:01:16,940 So let me just copy this. 19 00:01:16,940 --> 00:01:17,810 You are all for you. 20 00:01:18,620 --> 00:01:19,910 Let me be straightforward here. 21 00:01:20,810 --> 00:01:22,360 Let's do Wardrop. 22 00:01:22,370 --> 00:01:30,590 OK, so this is a particular are in this you are if you notice that your particular query that you searched 23 00:01:31,130 --> 00:01:38,660 was passing through this particular parameter, which is Q which stands for query and or. 24 00:01:38,660 --> 00:01:46,100 Q OK, so let me just delete everything else because that is not necessary for us right now. 25 00:01:46,520 --> 00:01:51,620 OK, so it looks something like this by police computer again by plus computer. 26 00:01:51,650 --> 00:01:57,650 OK, so what specific keywords that you are searching or the query that you are searching, you're getting 27 00:01:57,650 --> 00:01:59,210 results based on that. 28 00:01:59,690 --> 00:02:08,420 So based on our query for buying a computer, we got the results from Amazon and Flipkart in a similar 29 00:02:08,420 --> 00:02:08,870 manner. 30 00:02:09,320 --> 00:02:18,770 We can tune up our search queries based on we will get the results for so you can tune up your search 31 00:02:18,770 --> 00:02:26,990 query and you can find the sensitive information as well, which has been saved into the servers by 32 00:02:27,020 --> 00:02:29,420 the developers or the admins by mistake. 33 00:02:30,140 --> 00:02:36,860 So this is basically the whole concept of using a Google doc, but then you will be able to find out 34 00:02:36,860 --> 00:02:42,580 something sensitive into that particular server before going to that. 35 00:02:42,980 --> 00:02:48,300 Let's see some of the search operators, which are very, very useful for us. 36 00:02:49,100 --> 00:02:57,030 So the first one is site second is in you all next, as in text file type and in title. 37 00:02:58,190 --> 00:02:59,990 OK, so let's understand each one. 38 00:03:00,800 --> 00:03:01,940 The first one is site. 39 00:03:02,120 --> 00:03:09,530 So site basically means the website that you want to particularly search for. 40 00:03:09,620 --> 00:03:11,210 So let me just type a site. 41 00:03:12,320 --> 00:03:14,630 So this means the site that you want to search for. 42 00:03:14,660 --> 00:03:17,720 So let me type site star dot com. 43 00:03:18,200 --> 00:03:26,750 So I'm saying any website search for any website which contains in it you url, let's say India. 44 00:03:27,590 --> 00:03:36,320 OK, so you can see any website that ends with a top-level domain dot com. 45 00:03:36,320 --> 00:03:39,530 So you can see we got Web sites, dot com dot com dot com. 46 00:03:40,190 --> 00:03:42,860 Oh here we have got coming because of this. 47 00:03:42,860 --> 00:03:49,010 India in all India means in the US that will be matching something that is India. 48 00:03:49,020 --> 00:03:50,990 So let's see if this matches India. 49 00:03:52,040 --> 00:03:56,920 I can see in the world bar it is matching India perfect. 50 00:03:57,470 --> 00:04:06,620 So let us just modify this to let's see EU and let's try to match koruna and let's see if we get some 51 00:04:06,620 --> 00:04:07,070 results. 52 00:04:07,850 --> 00:04:16,850 Obviously these are the first results which are coming because of government has imposed Google to show 53 00:04:16,850 --> 00:04:19,310 first results from WHL. 54 00:04:19,790 --> 00:04:22,690 Apart from this, let's see if we get some other results. 55 00:04:22,700 --> 00:04:25,040 Yes, we got a Harvard result, not edu. 56 00:04:25,680 --> 00:04:28,340 OK, so let's do one more thing. 57 00:04:28,340 --> 00:04:34,880 Let's try to type this as dot com and let's see if we get some more results so you can see there are 58 00:04:34,880 --> 00:04:37,190 some results which are coming. 59 00:04:37,190 --> 00:04:38,520 But OK, so. 60 00:04:38,540 --> 00:04:39,950 Well, let's first let's see this. 61 00:04:40,250 --> 00:04:43,190 So Edu and coronaviruses matching over here. 62 00:04:43,200 --> 00:04:47,450 OK, let me just try to modify this and let me liquidy in you all. 63 00:04:49,070 --> 00:04:52,980 So let us type hack and hit enter. 64 00:04:53,600 --> 00:04:59,620 OK, so you will see dot com your orders which contains the in your a hack. 65 00:04:59,890 --> 00:05:01,810 OK, so you're a two in the you are. 66 00:05:01,820 --> 00:05:06,780 There must be a keyword or a word that is matching hack as you can see. 67 00:05:06,860 --> 00:05:08,720 Let me open up the three. 68 00:05:09,650 --> 00:05:12,260 So there is is hard there. 69 00:05:12,260 --> 00:05:12,650 Yes. 70 00:05:12,650 --> 00:05:13,460 How is that. 71 00:05:13,460 --> 00:05:14,900 And it ends with dot com. 72 00:05:15,290 --> 00:05:15,920 That's a fact. 73 00:05:15,920 --> 00:05:16,280 Is there. 74 00:05:16,280 --> 00:05:17,270 So it is there. 75 00:05:17,390 --> 00:05:18,520 Let us see over here. 76 00:05:18,530 --> 00:05:20,510 So your hack is again matching. 77 00:05:21,300 --> 00:05:28,500 So this is basically a simple Google dog search operator works, so we understood site sense for the 78 00:05:28,500 --> 00:05:34,350 website that you want to search for in all means that any order that is that you are Albar. 79 00:05:34,890 --> 00:05:36,390 The next one is in text. 80 00:05:36,390 --> 00:05:40,460 In text means inside that particular page text. 81 00:05:40,800 --> 00:05:44,620 So let us see this particular college. 82 00:05:45,120 --> 00:05:47,460 So this particular college is r.p.m.. 83 00:05:48,280 --> 00:05:55,980 And do not worry if you see this kind of message by Google because Google understands that you are not 84 00:05:56,340 --> 00:05:59,910 doing something with a normal user usually does. 85 00:06:00,630 --> 00:06:04,360 So just prove that you are not a robot and you are again, good to go. 86 00:06:04,860 --> 00:06:09,810 OK, so let's say our target is this particular cartridge, which is RPM's. 87 00:06:10,540 --> 00:06:16,260 So I want to know all the email ideas of this particular college. 88 00:06:16,260 --> 00:06:17,160 So how to do that? 89 00:06:17,460 --> 00:06:26,550 So I will just use site Kullen or Amazon.com because I can see the website escarpments dot com and let's 90 00:06:26,550 --> 00:06:28,380 say in text I'm going to use. 91 00:06:30,780 --> 00:06:33,400 Ah, Amazon dot com. 92 00:06:33,430 --> 00:06:42,060 OK, so it should start with Aderet, because I know it will start with, let's say example some name 93 00:06:42,060 --> 00:06:44,220 and read R.P.M. as dot com. 94 00:06:44,230 --> 00:06:48,150 It is going to end with this and let's search if we get something. 95 00:06:49,380 --> 00:06:51,190 So we have got a couple of results. 96 00:06:51,210 --> 00:06:53,790 Let me open up some results. 97 00:06:55,200 --> 00:06:57,780 So let's see if we get some results. 98 00:06:58,050 --> 00:06:59,520 Let us go over here. 99 00:06:59,730 --> 00:07:01,010 Let's click this one. 100 00:07:01,020 --> 00:07:01,950 This one as well. 101 00:07:02,700 --> 00:07:03,540 Let's click this. 102 00:07:03,540 --> 00:07:06,750 OK, so let's see if we have got some useful results. 103 00:07:07,920 --> 00:07:11,310 Let's do control f ateret IP address. 104 00:07:13,570 --> 00:07:18,010 So we can so we can see we have got an email address over here. 105 00:07:18,210 --> 00:07:21,250 Let's go over here again. 106 00:07:21,260 --> 00:07:22,070 We have got an e-mail. 107 00:07:23,560 --> 00:07:26,170 OK, so this time this website is still loading. 108 00:07:26,350 --> 00:07:27,070 It's loaded. 109 00:07:27,070 --> 00:07:29,280 And let us see if we add something over here. 110 00:07:29,290 --> 00:07:34,270 No, let us go on this one and let's see if we get something perfect. 111 00:07:34,630 --> 00:07:42,520 As you can see, instead of one, we have got many e-mail addresses, which means that through this 112 00:07:42,520 --> 00:07:50,810 way, you can read inside the text of that particular page, read the text of that particular page. 113 00:07:51,100 --> 00:07:57,280 So this way, you have identified that this is the this is the page and these are the e-mail addresses 114 00:07:57,280 --> 00:08:00,310 which are lying onto this specific page. 115 00:08:00,340 --> 00:08:02,550 OK, so, yeah. 116 00:08:02,560 --> 00:08:05,980 So this was one of the ways of using this particular operator. 117 00:08:06,310 --> 00:08:12,850 Now let's use the next operator wherein we are going to search for any Web site which ends with dot 118 00:08:12,850 --> 00:08:16,090 com and we are going to search for a file typed letter PDF. 119 00:08:16,120 --> 00:08:18,920 OK, so what type of file we are going to search. 120 00:08:18,940 --> 00:08:25,660 So let's say we are going to search something related to hacking so we may get hacking PDF. 121 00:08:25,660 --> 00:08:31,660 As you can see, the first result is from blackhead and you can see the file type SPDM Similarly again, 122 00:08:31,660 --> 00:08:34,070 pdf pdf pdf. 123 00:08:34,090 --> 00:08:36,100 OK, so we have got the results for PDF. 124 00:08:36,460 --> 00:08:42,310 Let's say I want the book, which is a Hacking for Dummies. 125 00:08:43,570 --> 00:08:46,350 Let's see if we get this book in a PDF format. 126 00:08:46,360 --> 00:08:53,200 So I have got a link over here and let's verify if this is the correct book and. 127 00:08:54,630 --> 00:08:55,120 Perfect. 128 00:08:55,140 --> 00:08:57,880 We have got the book, which is Hacking for Dummies. 129 00:08:58,150 --> 00:09:02,810 OK, this is the whole full book that we have got it from there. 130 00:09:03,390 --> 00:09:06,140 So similarly, it is not just related to PDF. 131 00:09:06,150 --> 00:09:07,950 You can search for any file type. 132 00:09:07,960 --> 00:09:16,980 So let's say I want to search for our networking party or let's say I want to submit this next morning 133 00:09:17,940 --> 00:09:18,720 for a project. 134 00:09:18,720 --> 00:09:19,560 So let's search for a. 135 00:09:20,820 --> 00:09:23,310 So if we have got some people. 136 00:09:23,460 --> 00:09:27,090 So let's modify this object. 137 00:09:28,580 --> 00:09:36,450 Let's write it away and networking because our keyword is networking and let's say file type calling 138 00:09:36,450 --> 00:09:37,470 people X. 139 00:09:39,730 --> 00:09:42,130 OK, so did we get anything? 140 00:09:42,160 --> 00:09:42,550 No. 141 00:09:42,950 --> 00:09:47,540 Let us try once more by modifying this particular operator. 142 00:09:47,570 --> 00:09:47,850 Yeah. 143 00:09:48,220 --> 00:09:56,580 And now you can see we got some results with PPD format and these are networking PPD. 144 00:09:56,620 --> 00:10:02,380 So, like, we just open up this basic networking party and it has started downloading. 145 00:10:03,020 --> 00:10:04,210 You can see there are more such. 146 00:10:04,210 --> 00:10:10,630 Please let the state open this and let's see if it is related to networks or it can be utilized or not. 147 00:10:11,290 --> 00:10:13,370 So this is one of the simplest way. 148 00:10:13,400 --> 00:10:19,000 Yeah, this is related to basics of networking, but I actually do not understand what types of. 149 00:10:21,230 --> 00:10:28,250 Networking, it is trying to download, so I'm just going to quickly get this. 150 00:10:28,580 --> 00:10:33,740 OK, so this was one of the way of downloading anything that you want and sort of networking we can 151 00:10:33,740 --> 00:10:38,990 get are trying to download something which contained some sensitive information. 152 00:10:38,990 --> 00:10:44,990 So let's say in and let's say an Excel file, which contains some login information. 153 00:10:47,120 --> 00:10:50,120 So you can see time tracking report, time tracking report. 154 00:10:50,150 --> 00:10:52,250 OK, so we have got something. 155 00:10:53,450 --> 00:10:57,780 So as a server audit report, we have got somewhat more sensitive. 156 00:10:57,800 --> 00:11:05,480 So instead of logins, let's type grades or credentials and so we can see we got something from Google 157 00:11:05,480 --> 00:11:07,520 or something is stole all that. 158 00:11:07,940 --> 00:11:10,670 And even Hawaii is storing some things. 159 00:11:10,670 --> 00:11:12,710 So this may be something sensitive. 160 00:11:13,490 --> 00:11:13,790 OK. 161 00:11:15,050 --> 00:11:18,260 Of course, there are more such Google Docs that you can use. 162 00:11:18,290 --> 00:11:24,740 Let me just go to this website, which is Google Hacking Database, where you can utilize a lot of Google 163 00:11:24,740 --> 00:11:26,660 Docs for your search queries. 164 00:11:27,320 --> 00:11:30,170 OK, so let me just show you one of. 165 00:11:31,900 --> 00:11:38,530 That particular dock, which contains a file containing juicy information and you can utilize any of 166 00:11:38,530 --> 00:11:43,800 this, so let's utilize this one and let's search it on the Google. 167 00:11:44,170 --> 00:11:48,040 If we get something sensitive for secret, start Wireman. 168 00:11:48,520 --> 00:11:52,540 So again, see, I have got multiple websites. 169 00:11:52,570 --> 00:11:55,870 Let's see if there is something secret in there. 170 00:11:56,440 --> 00:12:00,310 There is also a file database that famil in which I can see. 171 00:12:02,550 --> 00:12:08,210 No username and password, at least for now, let's see why is there something secret? 172 00:12:08,640 --> 00:12:10,440 Yeah, so there is a secret key. 173 00:12:10,440 --> 00:12:12,240 Secret key which can be. 174 00:12:14,670 --> 00:12:22,140 Harmful if it falls into some bad hands, as you can see or hear you, the name is Root and Password 175 00:12:22,140 --> 00:12:27,540 is this particular Facebook password for the database, as you can see or hear. 176 00:12:27,540 --> 00:12:32,860 Also, that is a database name, username and password for this particular target. 177 00:12:33,180 --> 00:12:38,670 So this is how you get sensitive information out of Target. 178 00:12:38,760 --> 00:12:43,850 OK, so there are numbers of Google Docs that you can utilize. 179 00:12:43,860 --> 00:12:50,160 So for finding sensitive information about Target, as you can see, this particular Google doc will 180 00:12:50,160 --> 00:12:59,430 give you backup files like this particular Google doc will give you log files and be a key extension. 181 00:12:59,650 --> 00:13:01,440 OK, so let's come back over here. 182 00:13:01,440 --> 00:13:09,330 And I have given some examples through which we can find FTP servers and websites, which is using HTTP. 183 00:13:09,630 --> 00:13:13,310 So you can just use this particular talk to copy this. 184 00:13:13,320 --> 00:13:16,790 Go to Google and let's try to search this. 185 00:13:18,600 --> 00:13:18,980 Yeah. 186 00:13:18,990 --> 00:13:27,030 So as you can see, I have got all the servers which are on FTP in case there is something sensitive 187 00:13:27,030 --> 00:13:36,210 which has been uploaded, then I can directly utilize that particular information for the attack purposes 188 00:13:36,210 --> 00:13:38,210 or for recon purposes as well. 189 00:13:38,880 --> 00:13:41,660 I can modify this also from 2018. 190 00:13:41,670 --> 00:13:48,870 So let's say I want all the data after twenty nineteen twenty twenty two thousand two or twenty twenty. 191 00:13:50,210 --> 00:13:56,960 I don't think anything will be twenty, twenty or twenty nineteen, I even get some useful information. 192 00:13:57,260 --> 00:14:02,410 OK, so this was what have to be you can also get it for HTP. 193 00:14:02,450 --> 00:14:08,110 OK, if you want some information about forums, about HDB can also get that. 194 00:14:08,170 --> 00:14:12,380 OK, moving on to the next one, find locked files with passwords. 195 00:14:12,410 --> 00:14:13,670 OK, so let's try this. 196 00:14:13,670 --> 00:14:17,630 If we can find some log files which contains passwords. 197 00:14:18,590 --> 00:14:27,230 So you can see we got some of the links where we may try to get some of the log files which have the 198 00:14:27,230 --> 00:14:27,920 password. 199 00:14:27,950 --> 00:14:32,690 OK, so this is basically a search honeypot log which contains username and password. 200 00:14:34,360 --> 00:14:40,780 OK, let's see over here, there is something called password dot log, OK, nothing sensitive over 201 00:14:40,780 --> 00:14:41,260 here. 202 00:14:42,370 --> 00:14:44,950 Yea, it looks something sensitive. 203 00:14:45,130 --> 00:14:47,790 JIRA slow, not long. 204 00:14:47,830 --> 00:14:50,530 OK, you can see there are some kind of logs over there. 205 00:14:51,460 --> 00:14:54,210 OK, so here we have some more sensitive information. 206 00:14:54,220 --> 00:15:00,490 Firefox password saward username password server username password for different different accounts. 207 00:15:01,240 --> 00:15:05,800 OK, so this is one more way where you can find log files with passwords. 208 00:15:06,400 --> 00:15:11,110 If you want configuration files with passwords, you can use this particular dark, which I'm going 209 00:15:11,110 --> 00:15:12,120 to use right now. 210 00:15:13,960 --> 00:15:19,390 Let us see if we get DB passwords for this particular Web site. 211 00:15:21,520 --> 00:15:22,320 If you see your. 212 00:15:23,880 --> 00:15:24,400 Excellent. 213 00:15:24,420 --> 00:15:30,430 We have got for my Google TV dot com username is this database's this password is given over here. 214 00:15:30,930 --> 00:15:33,350 So this is something very, very critical. 215 00:15:33,690 --> 00:15:35,630 As we can see for this particular websites. 216 00:15:36,870 --> 00:15:40,280 The DOT in the file contains this particular thing. 217 00:15:40,290 --> 00:15:43,230 And let's see if we have the password and you can see the password. 218 00:15:43,230 --> 00:15:46,470 Is this, again, something? 219 00:15:46,470 --> 00:15:48,260 Password, password, password. 220 00:15:48,270 --> 00:15:54,860 So we have got the password for this particular target as well for this bunghole service dot com, the 221 00:15:54,900 --> 00:15:57,800 only file we can again see the password over here. 222 00:15:58,710 --> 00:16:05,640 And this is kind of very, very poor security where in the database username and password, both are 223 00:16:05,640 --> 00:16:08,180 kept as best we are. 224 00:16:08,220 --> 00:16:09,180 You can see the username. 225 00:16:09,180 --> 00:16:10,380 Is this the password? 226 00:16:10,380 --> 00:16:14,300 Is this for another website, the username and password? 227 00:16:14,310 --> 00:16:14,930 Is this OK? 228 00:16:15,180 --> 00:16:21,600 So this is a sensitive information which has been leaked and I have already reported all this sensitive 229 00:16:21,600 --> 00:16:28,170 information to those target and they are in the process of fixing it already and must have fixed it 230 00:16:29,100 --> 00:16:31,310 while making this video's life. 231 00:16:31,890 --> 00:16:41,550 So I hope you understood how you can utilize this type of sensitive information to find a lot of details 232 00:16:41,550 --> 00:16:43,650 or juicy information from the target. 233 00:16:43,650 --> 00:16:49,460 And you can utilize that for your bug bounty hunting and pen testing work. 234 00:16:50,070 --> 00:16:51,690 So there is one more. 235 00:16:51,690 --> 00:16:53,350 If you want email start Exelis. 236 00:16:53,430 --> 00:16:55,700 You can use this particular Google doc. 237 00:16:55,710 --> 00:17:00,460 We have already seen this type of document in the file type is Excel and in the You are L'viv. 238 00:17:00,770 --> 00:17:03,600 We want something or less email or Exelis. 239 00:17:04,020 --> 00:17:07,140 If you want to find open cameras, you can also do that. 240 00:17:08,050 --> 00:17:11,360 Let's see if we get some cameras as well. 241 00:17:14,010 --> 00:17:19,830 OK, so let us we have got a couple of things, let's try to click each one of them and let's see if 242 00:17:19,830 --> 00:17:22,180 we get something sensitive in there. 243 00:17:22,800 --> 00:17:26,730 OK, so we have here it is live a video. 244 00:17:26,730 --> 00:17:33,060 As you can see, we have a live video stream of someone's camera and we have automatically logged in. 245 00:17:33,060 --> 00:17:35,320 As you can see, there is log out. 246 00:17:35,880 --> 00:17:42,030 So this was an unauthenticated camera through which we have logged in and we are able to see the livestream 247 00:17:42,360 --> 00:17:43,040 currently. 248 00:17:43,050 --> 00:17:48,270 And you can see this is the time, this is the date, and this is the time it is running right now for 249 00:17:48,270 --> 00:17:50,020 this particular camera. 250 00:17:50,460 --> 00:17:55,140 And you can see over here, this is again and unauthenticated camera there. 251 00:17:55,260 --> 00:17:57,190 We are able to see it again. 252 00:17:57,270 --> 00:18:03,750 But when we click on content, it is asking for a password when we try to modify the system administration 253 00:18:04,260 --> 00:18:04,560 here. 254 00:18:04,590 --> 00:18:11,900 Also, there is some type of camera which is open and here are the link camera, which is open. 255 00:18:11,910 --> 00:18:15,220 Again, that is the same for the server room. 256 00:18:15,240 --> 00:18:20,050 This, I think, is some of the college's camera, but this is the date and time which is going on. 257 00:18:20,700 --> 00:18:28,620 So this is how we get sensitive information about Target and we may also get information about the open 258 00:18:28,770 --> 00:18:32,790 Web cameras or poorly authenticated CCTV cameras. 259 00:18:33,480 --> 00:18:35,710 There is one more log that you can utilize. 260 00:18:37,110 --> 00:18:40,220 So let us see if we get something sensitive for this now. 261 00:18:40,680 --> 00:18:43,290 So we have got a couple of domains for this. 262 00:18:43,430 --> 00:18:47,880 Let's try to click and see if we get any camera access. 263 00:18:52,350 --> 00:18:56,810 OK, so we did not get any of those links working. 264 00:18:57,060 --> 00:19:03,160 Not sure why, but this is one of the ways that you can utilize to find out hidden camera links. 265 00:19:03,180 --> 00:19:11,130 OK, and unauthenticated cameras you can always use a lot of information is provided on Google and database. 266 00:19:11,130 --> 00:19:16,290 You can use this particular docs to find out sensitive information about the target. 267 00:19:17,130 --> 00:19:23,100 If you are searching for a specific target as well, you can search for that specific target as well 268 00:19:23,100 --> 00:19:30,120 by providing the name of the target, the website name Inside Call and Stop, for example, site Kulin 269 00:19:30,640 --> 00:19:31,250 dot com. 270 00:19:31,440 --> 00:19:36,400 And if you want to search for any Chesed log tokens, you can do that as well. 271 00:19:36,990 --> 00:19:44,910 So I hope you guys understood how you can use Google Docs for your purpose, for testing for bug bounty 272 00:19:44,910 --> 00:19:45,360 hunting. 273 00:19:45,600 --> 00:19:49,620 And you may get a lot of sensitive information on that. 274 00:19:50,340 --> 00:19:55,080 I have also uploaded some of the Google Docs so you can just use this Google Docs. 275 00:19:56,310 --> 00:20:02,260 These are five entries for a specific category, which is file containing juicy information. 276 00:20:02,280 --> 00:20:09,480 So if I just remove this category and you can see our other Google Docs, for example, for getting 277 00:20:09,480 --> 00:20:16,470 tokens, JWT authentication tokens, secret backup files, settings, aperture logs, etc.. 278 00:20:18,180 --> 00:20:24,000 So I hope you guys understood this Google hacking database and upcoming videos, I'm going to teach 279 00:20:24,000 --> 00:20:31,980 you how you can become your own author of one of your own Google Docs, which you can upload it over 280 00:20:31,980 --> 00:20:32,340 here. 281 00:20:32,550 --> 00:20:37,560 As you can see, I am the author of this particular doc which has this specific idea. 282 00:20:37,770 --> 00:20:45,720 You can also contribute to this particular Exploit DBE database for the community and others can use 283 00:20:45,720 --> 00:20:48,990 your particular Google doc for recon purposes. 284 00:20:50,220 --> 00:20:51,810 So I hope you guys understood this. 285 00:20:51,840 --> 00:20:52,380 Thank you.