Jason Sawyer(@foilmanhacks) 's Twitter Profileg
Jason Sawyer

@foilmanhacks

I hacked the Dutch Government 4 times :P
All views are my own.

ID:1773502448830914560

calendar_today29-03-2024 00:08:32

257 Tweets

110 Followers

30 Following

Cyber Detective💙💛(@cyb_detective) 's Twitter Profile Photo

One of the best Twitter accounts about Google Dorks is Mike Takahashi. You can use it to learn how to search Google for:
- server errors
- sensitive documents
- login pages
- API endpoints
- unlisted bug bounty programms

and more.

One of the best Twitter accounts about Google Dorks is @TakSec. You can use it to learn how to search Google for: - server errors - sensitive documents - login pages - API endpoints - unlisted bug bounty programms and more.
account_circle
Jason Sawyer(@foilmanhacks) 's Twitter Profile Photo

I've been playing with the Microsoft '0day' and I am getting some interesting results, code.microsoft.com/pages/systemca… and code.microsoft.com/pages/systemca… keep changing.
So, am I getting access to different servers?
And if so why is there random user's data on it?

account_circle
Jason Sawyer(@foilmanhacks) 's Twitter Profile Photo

People need to understand, YOUR EMAIL IS PII.
I have seen people have their child's youtube channel attached to their work email.
Please for the love of god, don't use guessable emails.
My name is Jason Sawyer but I do not have an email under that name.
i.e. [email protected]

account_circle
Jason Sawyer(@foilmanhacks) 's Twitter Profile Photo

To those who underestimate the importance of OSINT:
it's called information security for a reason; Open Source Intelligence (OSINT) is fundamental.

account_circle
Jason Sawyer(@foilmanhacks) 's Twitter Profile Photo

OSINT tip #1 Always check your target's sites for Analytics IDs such as a Google Analytics code.

I once used this method to uncover a client's private blog which had sensitive information.

OSINT tip #1 Always check your target's sites for Analytics IDs such as a Google Analytics code. #OSINT #privacy #cybersecurity I once used this method to uncover a client's private blog which had sensitive information.
account_circle
Jason Sawyer(@foilmanhacks) 's Twitter Profile Photo

I am sick and tired of some of these 'cybersecurity influencers' shilling shitty courses, devices and all round bad cybersecurity advice.
David Bombal
youtube.com/shorts/yT1HUo9…
Explain why I need this and why it is better than a free app. e.g play.google.com/store/apps/det…

account_circle