Hey guys!!
I was just testing on some public programs and trying to get the sensitive information of a company which is uncovered and makes it public to find it.

I started to do some google dorking to find the sensitive information. I found nothing sensitive that I can get into it and exploit it. Then I remember about the fofa dorking. In the beginning I was hopeless and thought waste of time while doing it. But I wanted to give it a try
I tried with some doking things like
body=".js.map"
body="# sourceMappingURL"
body="sourceMappingURL"
body="sourceMappingURL=" && body=".js.map"
body="\"version\":3" && body="\"sources\":" && body="\"mappings\":"
body="main.js.map"
body="app.js.map"
body="bundle.js.map"
body="index.js.map"
body="vendor.js.map"
body="chunk.js.map
body="runtime.js.map"
I got many urls to check it so I filtered the only 200 and checked of the website body.
Some showed me the directories, xml files, and many more. By this I started to look into it and found one of the finding.
I found the linux commands of a company which everything is stored and also includes the shutdown, runtime, passwords and many more.
I reported to the company and they replied me back as another researcher has already reported on that and made my finding as the duplicate.
If you ask my opinion which should be done either google dorking or fofa dorking?
I would recommend both. Both are important to get the sensitive information. Trying to get the sensitive information is very easy.
I found that finding in just 5 minutes of fofa dorking. This is why you should never skip the dorking while doing the bug hunting. Sometimes doing dorking is the best choice that you take.