All About Google Dorks

All About Google Dorks

In this blog, you will get to know about google Dorking and some pro tips which I used to become the author of my own google dork.

What is Google Dorking?

Did you ever get into the situation when you are searching for the term and the result just contradicts the output? So the solution is “Dorking” there are some advanced google searching keywords/queries to find information that is not easily available on the websites & which helps you to get better/exact results which you want.

There is a hell lot of dorks available on GHDB (google hacking database) where you can find much sensitive information. But keep in mind Dorking is just an advanced search method you can’t hack or achieve anything big/great just by Dorking it just comes handy in the information gathering process(recon).

What Google can do for a hacker?

Search sensitive information like payroll, SIN, even the personal email box

Vulnerabilities scanner

Popular dorks

Basic Formula of Dork

inurl:."domain"/"dorks"

Here,

“inurl” = input URL
“domain” = your desired domain ex. .gov
“dorks” = your dork of your choice

Some Example With Explanation Of Dork

  1. “Login: ” “password =” filetype: xls (searching data command to the system files that are stored in Microsoft Excel)
  2. allinurl: auth_user_file.txt (to find files auth_user_file.txt containing password on server).
  3. filetype: xls inurl: “password.xls” (looking for username and password in ms excel format). This command can change with admin.xls)
  4. intitle: login password (get link to the login page with the login words on the title and password words anywhere. If you want to the query index more pages, type allintitle)
  5. intitle: “Index of” master.passwd (index the master password page)
  6. index of / backup (will search the index backup file on server)
  7. intitle: index.of people.lst (will find web pages that contain user list).
  8. intitle: index.of passwd.bak ( will search the index backup password files)
  9. intitle: “Index of” pwd.db (searching database password files).
  10. intitle: “Index of .. etc” passwd (this command will index the password sequence page).
  11. index.of passlist.txt (will load the page containing password list in the clear text format).
  12. index.of.secret (google will bring on the page contains confidential document). This syntax also changed with government query site: gov to search for government secret files, including password data) or use syntax: index.of.private
  13. filetype: xls username password email (will find spreadsheets filese containing a list of username and password).
  14. “# PhpMyAdmin MySQL-Dump” filetype: txt (will index the page containing sensitive data administration that build with php)
  15. inurl: ipsec.secrets-history-bugs (contains confidential data that have only by the super user). or order with inurl: ipsec.secrets “holds shared secrets”
  16. inurl: ipsec.conf-intitle: manpage (useful to find files containing important data for hacking)
  17. inurl: “wvdial.conf” intext: “password” (display the dialup connection that contain phone number, username and password)
  18. inurl: “user.xls” intext: “password” (showing url that save username and passwords in spread sheet files)
  19. filetype: ldb admin (web server will look for the store password in a database that dos not delete by googledork) 20.inurl: search / admin.php (will look for php web page for admin login). If you are lucky, you will find admin configuration page to create a new user.

How to publish your own dorks?

when you got your desired google dork take for example — Dork:allintext:password filetype:log you just need to mail to the with the subject “allintext:password filetype:log" as it is the dork you have mined with author name and description you won’t get any confirmation mail that your dork is published on google hacking database nut yes they publish it within a maximum of 1 day you need to check your name manually if it’s published or not.

Some measures to take! Protect Your Data

Keep patching your systems and applications

Keep your sensitive data off the Web apply authentication — (RSA, Clienless VPN) — Disable directory browsing

Consider removing your site from Google’s index: google.com/remove.html.

Use a robots.txt file to against Web crawlers: robotstxt.org. Some Pro tips to publish your own!

If you want to publish your own dork sometimes the similar search results also have a dork that is useful and isn’t in the google hacking database.