Google Dorks

google dorks

I made a visit to null byte and found that there is not a complete tutorial about the Google Dorks, so I felt the need for this tutorial, and seeing that there are many newbies around, so here’s a tutorial that will teach you how to use Google to hack.

HISTORY of Google Dorks

The concept of “Google Hacking” dates back to 2002 when Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems and/or sensitive information disclosures – labeling them google dorks. some people call it google hacking. Google: If you still do not know what is Google, then you need to take a crash course in “how to use the internet” Dork: Someone who has odd interests, and is often silly at times.  A dork is also someone who can be themselves and not care what anyone thinks, In my opinion, A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. As a passive attack method, Google dorking can return usernames and passwords, email lists, sensitive documents, personally identifiable financial information (PIFI) and website vulnerabilities. That information can be used for any number of illegal activities, including cyberterrorism, industrial espionage, identity theft and cyberstalking

OPERATORS

As well as programming, google dorks also have its operators, I will not be able to show all operators but here are the most commonly used Operators. Let’s take a look at the special Google search operators that are used to construct those high powered google hack search terms.

  • intitle

Specifying intitle, will tell Google to show only those pages that have the term in their HTML title. For example intitle:”login page” will show those pages which have the term “login page” in the title text.

  • allintitle

Similar to intitle, but looks for all the specified terms in the title.

  • inurl

Searches for the specified term in the URL. For example inurl:”login.php”.

  • allinurl

Same as inurl, but searches for all terms in the URL.

  • filetype

Searches for specific file types. filetype: pdf will look for pdf files in websites. Similarly filetype:txt looks for files with extension .txt

  • ext

Similar to filetype. ext:pdf finds pdf extension files.

  • intext

Searches the content of the page. Somewhat like a plain google search. For example intext:”index of /”.

  • allintext

Similar to intext, but searches for all terms to be present in the text.

  • site

Limits the search to a specific site only. site:nullbyte.com

THE FORMULA OF GOOGLE DORKS

Dorks: They are like search criteria in which a search engine returns results related to your dork.
The process can be a little time consuming, but the outcome will be worth it after learning how to use dorks.

google hacking

Basic Formula of dork,

“inurl:.”domain”/”dorks” ”

So you would normally understand it like this:
“inurl” = input URL
“domain” = your desired domain ex. .gov
“dorks” = the dork of your choice

Here is another example of that

You can use following words instead of inurl :

intitle:
inurl:
intext:
define:
site:
phonebook:
maps:
book:
froogle:
info:
movie:
weather:
related:
link:

  • INTITLE:

You can use the intitle to find anything in the title of the website. Which also could be useful to find downloads or anything else.

intitle: index of mp3

  • INURL:

The inurl basically looks for anything after the: in the site URLs.

inurl:index.php?id=

  • INTEXT:

You can find literally everything using intext, you could even use the inurl dorks whit this.

intext:”Design & Developed By Seawind Solution Pvt.Ltd.”

Google will give you all the websites created by IT Masons that recently have bypass Admin Page Vulnerability in some websites, to try just choose a target from Google and add this to the URL /adminpanel/

And fill username and password like the information below :
Username : ‘=’ ‘OR’
Password : ‘=’ ‘OR’
and you will get the admin panel of the website some example:
http://www.vulnerablewebsite.com/adminpanel/index.php

  • DEFINE

Google will define this message and will look for what had this error for example,

define:”sql syntax error”

  • SITE:

Obviously, when we will use it, Google will look for a site.

site:wonderhowto.com

Google will look for any site related to wonder how too.

  • PHONEBOOK:

It will look for the phone number related to me, so use your victim’s name or yours instead.

phonebook:Mrnakupenda

  • MAPS:

Google will look on google maps for your search.

  • BOOKS:

Google has an online library store. If you want to find interesting books use this dork.

book:java language

This will look for any book Google has indexed with java language in it.

  • FROOGLE:

Used for froogle search instead of google.

  • INFO:

Google looks for anything you inputted but only information about string which you have put next to info: .

info:firefox

Above dork will show you a lot of things about firefox like what is firefox etc.

  • MOVIE:

You can find information about movies on google using this dork.

movie: watch Transformers online

  • WEATHER:

You can find information about weather on google using this dork.

weather: 01/08/2015 London

  • RELATED:

This will look for anything related to what you have entered next to related: .

related:hacking

Google’s response with sites about hacking skills.

  • LINK:

This one will works better instead of only looking in search URL, it will also look in the site for URL’s that possibly are vulnerable.

link:index.php?id=

This is very useful I would say even more then inurl.

Vulnerability Approach :

Once you search website using above dorks, now its time to check whether the website is vulnerable to SQL injection or not, we simply put in a quote ” ‘ ” at the end of the url address.

So our site will look like this,

http://www.site.com/index.php?id=123;

  • SOME EXTRAS

As far as I researched Google Dorks can help us getting the data from many websites.
These are some Google Dorks which can affect our online business:
site:.com intitle:”Thank You For Your Order” intext: Click Here to Download
site:.com intitle:”Thank You For Your Purchase” intext: Click Here to Download
intitle: Thank you for your Purchase! intext: PLR OR MRR OR Package OR Bonus
inurl:/thankyou
.html intitle: Thank you for your order! intext: Click Here to Download

CONCLUSION

Google dorks are very important, so I advise before you start your exploits against a particular victim the best way is to use google and see what you can find about the victim, and believe me, byt using google, a lot of times I did not even turn on Linux kali, by simple search on google, I found the password of my victim.

Author: MrNakup3nda

14 Comments

  1. Delphia

    Thanks, it is quite informative

  2. Nelle

    Thanks for the terrific post

  3. Claudio

    Thanks for the terrific article

  4. Gail

    Thank you for the great article

  5. Smartcity

    Thank you for the excellent article

  6. Sadye

    It works very well for me

  7. Aleida

    Thanks for the excellent post

  8. Brook

    Thanks for the wonderful guide

  9. Maple

    Loving the information on this site, you have done great job on the content.

  10. Unknown

    Howdy, i read your blog occasionally and i own a similar one and
    i was just curious if you get a lot of spam feedback? If so how do you
    reduce it, any plugin or anything you can suggest? I get so much lately it’s driving me mad so any assistance is very
    much appreciated.

    1. Dave

      Hi,

      Yes, you can use the service call Akismet. It free and pretty easy to install.

  11. Jack

    I enjoy your writing style genuinely loving this site.

  12. Senaida

    Real excellent info can be found on web site.

  13. Margaret

    Fine way of telling, and nice article to get data about my presentation focus, which i am going
    to deliver in school.

Leave a Reply