Google Dorking
Google Dorking
Google Dorking
Around since 2002, dorking usually involves using a search engine as a hacking
tool. Google's tremendous web crawling capabilities facilitate dorking. With a
Google dork, attackers can access a lot of information they wouldn't be able to
get with simple queries. This information includes the following:
usernames and passwords
email address lists
sensitive documents
personally identifiable information
website vulnerabilities
This information is used for many types of illegal activities,
including cybercrime, cyberterrorism, industrial espionage, identity
theft and cyberstalking. Hackers may also sell this data to other criminals on
the dark web for large sums of money
Be aware that Google also knows who we are when we perform such kind of
operations. So, it's advised to use it only with good intentions, whether for
your own research or while looking for ways to defend your website against
this kind of vulnerability.
Intrusion prevention measures proposed was to conduct Google dorking
expeditions using likely attack parameters to discover what type of information
an intruder could access
Cache Command:
cache:facebook.com
output:
Site Command:
site:facebook.com
output:
Ext Command:
site:https://www.ford.com/ ext:pdf
output:
Filetype Command :
filetype:sql intext:wp_users phpmyadmin
Output:
Inurl Command:
inurl:register.php
Output:
Intitle Command:
intitle:admin
Output:
“ ” Command:
“Cyber Security”
Output:
Allintext Command:
allintext:”username” “password”
output:
Allintitle command:
allintitle:”ip camera” “dvr”
Output:
Inpostitle Command:
inposttitle:weight loss goals
Output:
Allinanchor Command:
allinanchor:"how to scan vulnerabilities"
Output:
Inanchor Cmmand:
inanchor:"vulnerability scanning”
output:
AROUND Command:
vulnerbility scanning AROUND(2) tools
Output:
@ Command:
cybersecurity @facebook
Output:
Related Command:
“Related:facebook.com”
Output:
Info Command:
"Info:facebook.com"
Output:
Weather Command:
Intitle:"Weather Wing WS-2"
Output:
References:
https://www.cybrary.it/blog/0p3n/advanced-google-dorking-commands/
https://www.simplilearn.com/tutorials/cyber-security-tutorial/google-dorking
https://www.techtarget.com/whatis/definition/Google-dork-query
https://www.techopedia.com/definition/30938/google-dorking
https://hackr.io/blog/google-dorks-cheat-sheet