Exploring obfuscated, neglected, or otherwise exposed data is a critical exercise, both as part of a site's opening reconnaissance and as a dedicated end in itself.
We'll cover a couple of different ways, some passive and some more active, that will help you discover sensitive information that will win you a bounty payout.