Google dorking 101

INSEC ENSIAS Club
3 min readAug 29, 2021

--

Google dorks: are advanced search queries to find information easily that are not available on the websites and it is most of the time used by security researchers for recon

Google is a very useful hacking tool because of its capabilities of crawling web pages it can deliver to you a great amount of sensitive data that might help you find vulnerabilities of any website.

So let’s begin:

Before starting the search it’s recommended to use a vpn or change your ip.

Operators:

1. intitle: searching pages that contain the term in their html title

2. inurl searching pages that contain the term in their url or allinurl for many words

3. filytype: search for certain file type ex:

"blogger" "email" filetype:csv OR filetype:xls OR filetype:xlsx
Find backlinks:
“dofollow” OR “nofollow” OR “backlink” “contact” OR “email” filetype:csv OR filetype:xls OR filetype:xlsx

4. ext: find extention

5. intext search for text content in page

6. site: filter the search by one site only

LinkedIn profiles of influencers in Growth:
site:linkedin.com/in/ "growth"

7. cache: facebook . com this dork will show you the cached version of any website ex. facebook

Logical operators:

| : for ex “ensias” | “um5” this will show you sites that contain “ensias” or “um5” or both

+ concatenates two words

this operator is used to exclude the word from the search results

Application examples :

ssh private keys:

intitle:index.of id_rsa -id_rsa.pub

Finding Emails, Admin users

1-intext:@gmail.com
2-filetype:xls inurl:”email.xls”
3-filetype:php inurl:catalog/admin/

get databases

“intitle:index of”

intitle:”Index of..etc” passwdex. intitle:index of hacking

Enjoy free Defcon’s slides

And also Black hat talks of 2021

site:i.blackhat.com inurl:/USA-21/

I personally tried some and they still work😁

The most basic one to find groups :

inurl : http://chat.whatsapp.com

to find directories that contain backups images here you go:

intitle: “WhatsApp Images”

Access login pages directly:

site:target.com intext:login intext:username intext:password

other variant: (site:facebook.com | site:twitter.com) & intext:”login”

And the king:

site:* . target .com inurl:url

The Power of combining Advanced Operands:

site:target . com –site:www . target . com

— shows all websites NOT from the official Webserver.

We will talk later about another powerful tool : Shodan.io

and more on github dorks because it’s handy.

And finally a great resource for google dorks that are updated everyday can be found here: https://www.exploit-db.com/google-hacking-database

and here is another searching tool if you want to apply it on target https://pentest-tools.com/information-gathering/google-hacking#

Pro tip: You can 👏 up to 50 times on a post to show how much you liked it.

Adios❤

Twitter:- https://twitter.com/4rr4ys

Club links:

Facebook:- https://www.facebook.com/ensiasinsec

Youtube:- https://www.youtube.com/channel/UCQ_DuJJtTg05hjntfwVEy0Q

Instagram:- https://www.instagram.com/insec_club/

Linkedin:- https://www.linkedin.com/company/insec-ensias/

writer: Ikram Bourhim

--

--

INSEC ENSIAS Club
INSEC ENSIAS Club

Written by INSEC ENSIAS Club

INSEC is the resident computer security club at ENSIAS.

No responses yet