During my reconnaissance fase, I discovered several exposed Google Maps API keys by scanning a large list of subdomains for secrets in their HTTP response bodies. The process was entirely passive, and no interaction beyond simple GET requests was used to obtain this information.
ProjectDiscovery's Chaos
dataset to download a large set of public subdomains associated with bug bounty programs.
choas -dL domains.txt -o subs.txt
This yeided over 10,000 subdomains.
httpx-toolkit
with a custom regex filter pattern to search for Google Maps API keys in the HTTP responses of these subdomains.
httpx -l subs.txt -mr 'AIza[0-9A-Za-z\-_]{35}'
gmapsapiscanner
.
python3 maps_api_scanner.py --api-key AIzaSyD***********************nOpw
Leaked Google Maps API keys can potentially be abused for:
Free quota exhaustion leading to billing abuse
Unauthorized access to Maps, Geocoding, or Places API
Leaking internal information via autocomplete or reverse geocoding