
Google dorking or Google Hacking is a hacking technique that uses the advance search functionality in Googles search engine.
Now a hacker isn’t going to just search your company name and have Google return all of your vulnerable web applications or exposed documents. What it will do is return hundreds of sites that match or are similar to each word that you have searched for. Some will be relevant and a lot of it won’t be. You would be pretty desperate to ever go past page 6 and a hacker isn’t going to waste time doing this. Instead, they are going to use Google Dorks to have Google return specific queries such as URLs that contain certain file extensions.
If you don’t want to go through the hassle of remembering them, you could also use the advance search page:
https://www.google.com/advanced_search?
The other thing to note is that Google records all searches. If you are thinking about doing some reconnaissance under the radar, you would be better using DuckDuckGo.
If you want to use the examples below, you will just need to replace [Keyword] with your query. You can also add another layer by adding keywords in front of the query or other Dorks, such as:
“Why did they make Vista site:Microsoft.com”
The “” are needed.
If you wanted to search keywords within a URL, you could use:
inurl:[Keyword]
Example: inurl:admin.php
If you wanted to only search withing a given domain:
site:[Keyword]
Example: site:Microsoft.com
If you wanted to only search for certain files:
filetype:[Keyword]
Example: filetype:log
If you wanted to search the body of the website for specific text:
intext:[Keyword]
Example: intext:username filetype:log
If you wanted to search for links:
link:[Keyword]
Example: link:microsoft.com
If you wanted to find information Google has on a page:
info: [Keyword]
Example: info:www.myspace.com
These are very basic examples in which you can use to return specific information from Google. When you mix these with known vulnerabilities or common vendor variables you can get some pretty interesting results.
Finding indexed SSH private keys:
intitle:index.of id_rsa -id_rsa.pub
Fetching SSH usernames from logs:
filetype:log username putty
Open FTP servers:
intitle:”index of” inurl:ftp
Finding saved email addresses:
filetype:xls inurl:”email.xls”
If you wanted to search a specific company, remember you can add a common search or add another dork:
“[Keyword]” filetype:xls inurl:”email.xls”
IP Based Cameras:
inurl:top.htm inurl:currenttime
Juniper Web Device Manager Login:
intitle:”Log In – Juniper Web Device Manager”
Dell Server IDRAC Login Portals:
intitle:”iDRAC-login”
Finding company default passwords. You can either narrow it down by one file type or pipe several, like so:
“your default password is” filetype:doc | filetype:pdf | filetype:csv | filetype:pdf | filetype:docx
Cisco GroupPwds:
filetype:pcf “cisco” “GroupPwd”
As you can see, if you get creative, you can find some really interesting stuff. Vendors often follow common patterns, so try and have a think of keywords you could use to pull specific results back. If you can’t think of any, try looking through the Google Hacking DB: https://www.exploit-db.com/google-hacking-database?
Remember, reconnaissance isn’t illegal but acting on what you fine might.
8 responses to “How To Hack With Google Dorks”
[…] If you are not after a person but a company instead, Google can still be your friend. Using Google Dorks is an effective way to identify any company data which is available online. This might be intentionally or by accident. Again, instead of repeating myself, here is the link to show you how: https://ctrlaltdel.blog/2019/05/02/how-to-hack-with-google-dorks/ […]
LikeLike
[…] Your friendly neighbourhood search engine can also be used. I’ve already covered this, so here is a handy link: https://ctrlaltdel.blog/2019/05/02/how-to-hack-with-google-dorks/ […]
LikeLike
Everyone loves it whenever people come together and share views.
Great website, stick with it!
LikeLike
[…] use Google Dorks and find an email […]
LikeLike
Have you ever considered about including a little
bit more than just your articles? I mean, what you say is important and all.
However imagine if you added some great visuals or video clips to give your posts more, “pop”!
Your content is excellent but with pics and videos, this website could undeniably be one of the greatest in its
niche. Amazing blog!
LikeLike
Thanks for the feedback. I have considered adding videos! 🙂
LikeLike
[…] A simple technique would be using Google dorks. Google indexes the internet so it can be used to find things such as Zoom meetings.. More on Google Dorks […]
LikeLike
[…] What is Google Dorking? Google dorking or Google Hacking is a hacking technique that uses the advanced search functionality in Google’s search engine. Check out this amazing blog about google hacking: https://securethelogs.com/2019/05/02/how-to-hack-with-google-dorks/ […]
LikeLike