0% found this document useful (0 votes)
2K views3 pages

Google Dork

google dorking techniques

Uploaded by

06mi4beucl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views3 pages

Google Dork

google dorking techniques

Uploaded by

06mi4beucl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Identify Web Server

 HTTP Headers : cURL command - gives the header info and which server its utilizing

 Whatweb online tools

o https://hackertarget.com/whatweb-scan/

o https://whatweb.net/

 Netcraft online tools

o https://sitereport.netcraft.com/

 Nmap

o Nmap query - nmap -p 80,443 --script=http-server-header -T2 -Pn --reason


geeksforgeeks.org

2. Identify Web technologies

 Wappalyzer

o Browser extensions like Wappalyzer or BuiltWith can detect technologies like CMS
(WordPress, Joomla), JavaScript frameworks (React, Angular), and analytics tools.

3. Database

 Error messages : poorly configured servers

 SQL map

 Look for metadata that might hint at a database. For example, a .php extension often hints at
MySQL, while .aspx might suggest Microsoft SQL Server.
Common Dorks and Their Uses

Here are some practical dorks to use for various purposes:

1. Sensitive Files and Directories

 Dork: intitle:"index of" "parent directory"

 Dork: filetype:pdf "confidential"

 Dork: filetype:doc "confidential"

2. Login Pages

 Dork: inurl:login

 Dork: intitle:"login"

 Dork: intitle:"admin login"

3. Sensitive Information

 Dork: site:example.com "password"

 Dork: intext:"username" intext:"password"

 Dork: filetype:sql "password"

4. Exposed Directories

 Dork: intitle:index.of "admin"

 Dork: intitle:"index of" "backup"

 Dork: intitle:"index of" "config"

5. Database Exposure

 Dork: filetype:sql "password"


 Dork: filetype:db "password"

6. Vulnerable Devices

 Dork: intitle:"Router" "Model"

 Dork: inurl:"/cgi-bin/"

7. Publicly Accessible Admin Interfaces

 Dork: inurl:admin

 Dork: intitle:"Admin" inurl:"/admin"

8. Configuration Files

 Dork: filetype:config "database"

 Dork: filetype:env "database"

9. System Information

 Dork: intitle:"server-status"

 Dork: intitle:"test" inurl:"/status"

Advanced Queries

For more refined searches, consider combining operators or excluding specific terms:

 Combining Operators:

 Excluding Terms:

Imp Links

1. https://sankalppatil12112001.medium.com/google-hacking-google-dorks-for-sensitive-
information-f1d5a8eedb32

2. https://www.linkedin.com/pulse/mastering-google-dorks-ritik-shrivas-9hn0c/?trackingId=iaXpfU
%2FvTgWJBpbZCMoO0A%3D%3D

You might also like