For working professionals
For fresh graduates
More
Learn Cyber Security Tutorial …
1. Cyber Security
2. Difference between Circuit Switching and Packet Switching
3. Difference Between Hub and Switch
4. Difference between IPv4 and IPv6
5. Distance Vector Routing (DVR) Protocol
6. Go-Back-N ARQ
7. What is Google Dorking
Now Reading
8. How Does The Internet Work
9. Identity And Access Management (IAM)
10. OSI Model
11. Selective Repeat ARQ
12. Sliding Window Protocol
13. Two Factor Authentication
14. Digital Signatures and Certificates
15. What is VPN and How It Works?
16. What is Firewall
17. What Is Network Topology
18. Subnetting in Computer Networks
19. Intrusion Prevention Systems
20. Network Segmentation
21. Endpoint Detection and Response
22. Security Information and Event Management (SIEM)
23. Data Loss Prevention (DLP)
24. Cross Site Scripting (XSS)
25. Software Bill of Materials(SBOM)
26. ESG Frameworks
We’re all aware of Google’s bounty of resources. But how does it permit ethical hacking? Google Dorking, as named by Johnny Long in 2002, is a resourceful mechanism you can readily use to access almost everything. This includes a user’s username, their passwords, bank transactions, and even a live camera feed.
Sounds scary, right? I feel otherwise.
You see, when you do a regular search on Google, you can only access limited information, thanks to the system. But with Google Dorking, you have access to multiple information within a page.
Want to track a bug in your code? Google Dorking has you covered!
Google dorking in ethical hacking has been an extremely useful hack, especially for my projects. It has also helped me gain access to public code repositories, sample datasets, or even forgotten APIs.
Google Dorking is more of an advanced search filter for your favorite app. With Google Dorks, you can mix and match these codes and get extremely specific information. Additionally, Dorking is a technique rather than a tool so you can always customize it.
Now, coming to the technicalities, special Google dork commands like filetype and intitle can offer you preferred results. These “special commands” are used by Google to target specific locations, file types, and even keywords within website code.
Basically, by using Google’s indexed information, Dorking creates queries that ask for specific data points. Use it the right way, and you may crack the code for your next round of competitor analysis!
In short, Dorking uses these search operators and displays data regarding:
Johnny Long, our man of the hour, had been working away with codes when he pushed custom searches to look for information that could be easily breached. As suspicious as it sounds, this was all done with good intent and Long even made a list of advanced Google hacking database commands.
Although the origin of the term ‘Dorking’ may be disputed, you can always rely on Long’s contribution towards ethical hacking.
If you’re unsure what query operator to use for Dorking, here are some:
The Google Hacking Database (GHDB), famously compiled by Johnny Long, lists all possible search queries. Coders refer to these as Dorks as we uncover confidential information now and then.
Due to many other malicious users, the GHDB isn't accessible directly to the public. But you can always make an exception by doing your research better. Yes, you can access it via security forums, online tutorials, and other ways like search operators.
Here is my cheatsheet full of Google Dorks:
Search intent | Google Dork commands |
Find documents related to Microsoft Word | filetype:doc |
Find text documents | filetype:txt |
Find Excel spreadsheets | filetype:xls |
Find PowerPoint presentations | filetype:ppt |
Find PDF files | filetype:pdf |
Find Apache default pages | intitle:"Apache2 Debian Default Page" |
Search for login pages | intitle:"Login" or intitle:"Log In" |
Find Nginx default pages | intitle:"Welcome to nginx!" |
Find open directories on web servers | intitle:"Index of /" |
Find open IIS servers | intitle:"Welcome to IIS" |
Find exposed configuration files | intitle:"config.json" |
Search for directory listings | intitle:"Index of /" or intitle:"Browse Directory" |
Identify exposed Git repositories | intitle:"index of" inurl:.git |
Discover exposed MongoDB databases | intitle:"MongoDB Server Information" |
Search for exposed Memcached servers | intitle:"Memcached Server Information” |
Search for open VoIP systems | intitle:"Asterisk Management Portal" |
Identify exposed AXIS cameras | intitle:"Live View / - AXIS" |
Although I've stated that there are specific tools to indulge in Dorking, you can always use these for an easier experience:
The Google Dork list goes on and on. Talking about techniques, here are some of the Google hacking techniques I can vouch for:
With these Dork commands, you can access every secret (legally):
I’ll keep it short. To summarize all of my thoughts so far, here are the best advantages of Google Dorking:
Truth be told, there are potential dangers to using Dorks and these are:
Unless you’ve been living under a rock, you know the steps you can take to secure your web search. Here’s my two cents:
Google Dorking is a powerful tool for ethical hackers and security professionals. Remember, with great power comes great responsibility. Use Dorking ethically and responsibly to make the web a safer and more informative place. Implement the best practices available on the web and Dork well!
To get better at cybersecurity and keep up with the latest techniques, check out upGrad's cybersecurity courses. They're designed to help you learn all you need to know from experienced instructors.
1. What is Google Dorking used for?
Google Dorking is a tool primarily meant for advanced search operations for unmasking information available on the web.
2. What are the benefits of Google Dorks?
Google Dorks can find hidden information about websites like usernames and passwords, email lists, and phone numbers. It can also access sensitive and private data like bank accounts and transactions.
3. What is a Google Dork for username and password?
The Google Dork for usernames is “inurl:username” and “inurl:password” for passwords.
4. Is Google Dorking legal?
Google Dorking differentiates itself from illicit practices as it is often used by multiple security professionals to trace existing vulnerabilities in the system.
5. What do Google Dorks include?
Google Dorks includes private and confidential resources like usernames, passwords, credit card information, and email addresses.
6. Who uses Google Dorking?
As a coder, I use Google Dorking in the field of ethical hacking and for identifying potential vulnerabilities in the system.
7. What is an example of a Google Dork?
An example of Google Dork is ‘filetype:pdf’ which shows results for PDF files within the constraints of a page’s URL.
8. What is the file type for Google Dorking?
Some of the file types for Google Dorking are “filetype:”, “inurl:”, “allinurl:”, and “intext:”.
Author
Talk to our experts. We are available 7 days a week, 9 AM to 12 AM (midnight)
Indian Nationals
1800 210 2020
Foreign Nationals
+918045604032
1.The above statistics depend on various factors and individual results may vary. Past performance is no guarantee of future results.
2.The student assumes full responsibility for all expenses associated with visas, travel, & related costs. upGrad does not provide any a.