Personally Identifiable Information (PII) is any data that can identify an individual. In security testing and bug bounty hunting, finding exposed PII is a critical high-impact discovery. This series will cover discovery, validation, and reporting across three parts.
PII is categorized by how directly it identifies a person and its sensitivity. Core categories include direct identifiers like SSN or passport numbers, and indirect identifiers that identify a person when combined with other data.
PII is also classified as sensitive or non-sensitive based on the potential harm caused by a leak. Sensitive PII, such as financial or medical records, requires strong protection. Non-sensitive PII, like public phone numbers or email addresses, typically poses a lower risk.
π₯ What Actually Qualifies as PII?
πΈ Direct Identifiers (Highest Risk)
- National ID (SSN)
- Passport Number
- Full Name + Date of Birth
- Driver's License Number
πΈ Digital Identifiers
- Email Address
- IP Address
- Account Username
- Device ID
- Social Media Profile with identifying details
πΈ Financial Identifiers
- Full Credit/Debit Card Number (PAN)
- Bank Account Number
πΈ Contextual Identifiers
- Information that, when combined (e.g., Job Title + Company + City), can identify a person.
π‘ Why PII Hunting is Critical for Security & Bounty
- Legal & Compliance: Exposing PII violates major regulations like GDPR, CCPA, and HIPAA, leading to massive fines.
- High-Impact Findings: A single leak can affect thousands of users, making it a high-severity bug bounty issue.
- Real-World Harm: Exposed data fuels identity theft, financial fraud, and phishing attacks.
π Part 1: The Reconnaissance & Initial Discovery Phase
Goal: Identify data entry points and potential leak sources.
1οΈβ£ Target Surface Mapping
- Map all subdomains:
assetfinder,subfinder,amass - Identify technologies:
wappalyzer,builtwith - Find parameters:
arjun,paramspider
2οΈβ£ Google Dorking for Obvious Leaks
site:example.com filetype:csv | filetype:xlsx | filetype:pdf
site:example.com "confidential" | "internal" | "employee list"
intitle:"index of" "backup" site:example.com3οΈβ£ Basic Fuzzing for Common Files
Look for common backup or configuration files that may contain sensitive data:
ffuf -w ~/SecLists/Discovery/Web-Content/common.txt -u https://target.com/FUZZ -e .bak,.old,.txt,.sql,.tar.gzOther important tools:
subfinder, amass, httpx, gobuster
π What's Next?
Follow @cybersecplayground for Part 2: Deep-Dive PII Hunting Techniques.
β Like & Share if you're ready to hunt for data leaks! π
β οΈ Pro Tip: Always check /robots.txt and /.git/ for clues about hidden directories containing data!
β Support & Follow CyberSecPlayground
If you enjoy this project and want daily hacking labs, Linux security breakdowns, exploit write-ups, red team techniques, CVE PoCs, and advanced cybersecurity content, follow our community:
π Telegram: https://t.me/cybersecplayground π GitHub: https://github.com/cybersecplayground π Medium: https://medium.com/@cybersecplayground
#PII #Reconnaissance #BugBounty #OSINT #CyberSecurity #DataLeak #InfoSec