Introduction to Google Dorking

Generally, people use Google Search to find images, videos, news, specific information, etc. However, Google has special operators known as Dork that can be used to search specifically. Hackers use this technique to get information for a specific target which can help them to get sensitive information like usernames and passwords.


Google Dorking is a technique that uses Google's search and other applications to find security holes in the configuration and the coding techniques used by the website. Advanced operators can be used inside the search engine to locate specific strings of text within search results eliminating irrelevant data. 


Google Dork is a search string criterion, creating complex search queries in which the search engine returns the results according to the requested dork that might help attackers find vulnerable targets. The syntax to use a google dork operator is as follows: operator:search_term. Note: Do not enter any spaces between the operator and the query. 

This goes without saying that Google knows who you are when you perform activities like this. Only use this information for legal purposes. If the information is available on the Internet does not mean it can be used to harm others. Any illegal activities will result in cybercrime charges.


Operators:

  • site: Search only one website. site operator limits the search. The below example will show the results of hacks on the website hackhunt.in
hacks site:hackhunt.in 
  • intitle: Searches for the string in the title of the HTML page. The below example will show the results which have python in the page title.
intitle:python
  • inurl: Searches for the string in the URL. The below example shows the result of websites that have login.php in the URL.
inurl:login.php
  • intext: Searches for the string in the content of the page. This command is similar to a normal Google search. The below example shows the result of the websites which has programming word in it.
intext:programming

Or can be combined with other operators like suppose we need results containing hacks from hackhunt.in website. So,

site:hackhunt.in intext:hacks
  • filetype: Searches for the string as a file type. The below example will show PDFs available on the internet.
filetype:pdf

Or if you want a presentation on the topic of Python.

python filetyle:ppt | filetype:pptx
Note: | can be used as a Logical OR.
  • cache: This will show you the cached version of the site. Google always takes a snapshot of the website which later becomes a part of Google's Cache. If the website is down these cached websites are helpful. The below example will show the cached version of facebook.com.
cache:facebook.com
  • link: Displays all the pages linked to the specified URL. The below example will show the linked pages to hackhunt.in. Note: You cannot combine a link search with a regular keyword. Also, when combined with other advanced operators, google may not return all the pages that match. 
link:hackhunt.in
  • allinurl: Restricts results to only the keywords in the URL. The below example will show the pages containing "hackhunt" and "career" in the URL.
allinurl:hackhunt career
  • allintitle: Restricts the results to all the strings in the title of the HTML page. The below example will show the pages with the title python and hackhunt in it. 
allintitle:python hackhunt
  • inanchor: Restricts the results to only pages containing the string in the anchor text on links of the pages. The below example will show the pages with anchor tags vapt on pages containing cybersecurity.
cybersecurity inanchor:vapt
  • allinanchor: Restricts the results to only pages containing all the strings mentioned in the anchor text on links of pages. The below example will show the pages with anchor tags vapt or hacking on pages containing cybersecurity. 
cybersecurity allinanchor:vapt hacking
  • related: Displays websites that are similar or related to the URL specified. The below example will show you the pages related to www.hackhunt.in.
related:www.hackhunt.in
  • info: Finds information for the specified web page. The below example will show you the information on Hack Hunt's HomePage. 
info:hackhunt.in
  • location: Finds information for a specific location. The below example will show you the results based on cybersecurity offices. 
location:cybersecurity offices

  • *: This can be used as anything in that place. The below example will show the results for how to be on/create/post a poll/... Facebook etc. Or you want all the subdomains of  facebook.com.
how to * facebook
site:*.facebook.com

You can get more of this on Google Hacking Database which is also known as GHDB where many dorks are published by Cybersecurity researchers, and penetration testers which can be used, and also can be modified to ease our work.  


If you would like to perform basic RECON on a website or know what files are exposed to the Internet. Go to Pentest-Tools, type the name of the website, click the options mentioned below and check the results.


You might be interested in,

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

No comments:

Post a Comment