HackerNoon Mobile

Better reading experience on the app
What happened After I Scanned 2.6 Million Domains for Exposed .DS_Store Filesby@sdcat
1,128 reads

What happened After I Scanned 2.6 Million Domains for Exposed .DS_Store Files

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

After scanning for public .git directories and exposed .env files. I scanned the dataset of 2.6 million domains for exposed .DS_Store files. I found 8'462 exposed .DS_Store files. From these files I extracted 19'266 unique folder and file names. About 40% of these file are accessible. 10 database dumps with usernames and passwords, config files, ssl certificates and “pseudo hidden” admin panels where exposed.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - What happened After I Scanned 2.6 Million Domains for Exposed .DS_Store Files
sdcat HackerNoon profile picture

@sdcat

sdcat


Receive Stories from @sdcat

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!