paint-brush
What happened After I Scanned 2.6 Million Domains for Exposed .DS_Store Filesby@sdcat
1,429 reads
1,429 reads

What happened After I Scanned 2.6 Million Domains for Exposed .DS_Store Files

by sdcat2mNovember 17th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

After scanning for public .git directories and exposed .env files. I scanned the dataset of 2.6 million domains for exposed .DS_Store files. I found 8'462 exposed .DS_Store files. From these files I extracted 19'266 unique folder and file names. About 40% of these file are accessible. 10 database dumps with usernames and passwords, config files, ssl certificates and “pseudo hidden” admin panels where exposed.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - What happened After I Scanned 2.6 Million Domains for Exposed .DS_Store Files
sdcat HackerNoon profile picture
sdcat

sdcat

@sdcat

Software developing cat

L O A D I N G
. . . comments & more!

About Author

sdcat HackerNoon profile picture
sdcat@sdcat
Software developing cat

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite