Google is the most popular search engine on the internet right now. People use it to find their answers, images, videos, news, notes, etc. But, did you know that Google can also help hackers to find vulnerable targets and steal unauthorized information? Google is as much helpful for hackers as any other general user.
Hackers use the Google search engine to find Vulnerable systems (Be it a database, website, security cameras, or any IoT gadget) with the help of some special search queries. There are many Google search engine queries that can uncover vulnerable systems and/or sensitive information disclosures. These queries are known as Google Dorks.
Note: This article is only for educational purposes. You can use this knowledge to increase your system’s security or for any ethical purpose.
Contents
What is Google Dork or Google Dorking?
In 2002, Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems or sensitive information disclosures. He labeled them Google dorks. Some people call it Google hacking.
Google Dorking is the method for finding vulnerable targets using Google Dorks. Google Dorking can return usernames and passwords, email lists, sensitive documents, and website vulnerabilities.
Ethical Hackers use Google Dorking to improve system security. Black hat hackers use this technique for illegal activities, including cyber terrorism, industrial espionage, and identity theft.
Google dorks can find Footholds, Sensitive Directories, Vulnerable Files, Vulnerable Servers, Network or Vulnerability Data, Various Online Devices, Files Containing Usernames and Passwords, Sensitive Online Shopping Info and Pages Containing Login Portals.
List of Google Dork Queries (Updated List)
Google dork Queries are special search queries that can be searched as any other query you search on the Google search engine. You just need to type the query in the Google search engine along with the specified parameters.
1. Google Dorks For Hacking websites
- intitle: This dork will tell Google to show only those pages that have the term in their HTML title. For example: intitle:”login page” will show those pages which have the term “login page” in the title text.
- allintitle: It is similar to intitle but looks for all the specified terms in the title. For example: allintitle:”login page”
- inurl: It searches for the specified term in the URL. For example inurl:”login.php” and inurl:proftpdpasswd
- allinurl: It is similar to inurl but looks for all the specified terms in the URL. For example: allinurl:”login.php”.
- define: Google will define this message and will look for what had this error. For example: define:”sql syntax error”
- site: This dork will return all the pages of a particular website that is crawled by Google. For example, site:technotification.com.
- link: It will also look in the site for URLs that possibly are vulnerable to SQL injection. For example: link:index.php?id=
2. Google Dorks For Hacking Files
- filetype: Searches for specific file types. filetype:pdf will look for pdf files in websites. filetype:txt looks for files with .txt extension. This way you can search for a file with any extension like mp4, mp3, Mkv, etc. site:onedrive.live.com shared by
- intitle: You can look into file directories of websites directly and download specified file intitle: index of mp3 for mp3 files. You can replace mp3 with any other extension. You can also use to find any particular movie or game. intitle: “index of ” intext: “movie name” .
- book: find any book using Google search engine. for example book: java
3. Google Dorks for finding usernames and passwords
- intext: passwords filetype: txt
- mysql history files
- intext: account details filetype: txt
- intitle:index.of intext:”secring .skr”|&q…
- people.lst
- passwd
- master.passwd
- pwd.db
- htpasswd / htpasswd.bak
- htpasswd / htgroup
- spwd.db / passwd
- passwd / etc (reliable)
- config.php
- passlist
4. Google Dorks For Hacking Security Cameras
Type any of these queries into google to find vulnerable security cameras
- Inurl:”CgiStart?page=”
- inurl:/view.shtml
- intitle:”Live View / – AXIS
- inurl:view/view.shtml
- inurl:ViewerFrame?Mode=
- inurl:ViewerFrame?Mode=Refresh
- inurl:axis-cgi/jpg
- inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
- inurl:view/indexFrame.shtml
- inurl:view/index.shtml
- inurl:view/view.shtml
- liveapplet
- intitle:”live view” intitle:axis
- intitle:liveapplet
- allintitle:”Network Camera NetworkCamera” (disconnected)
- intitle:axis intitle:”video server”
- intitle:liveapplet inurl:LvAppl
- intitle:”EvoCam” inurl:”webcam.html”
- intitle:”Live NetSnap Cam-Server feed”
- intitle:”Live View / – AXIS”
- inurl:indexFrame.shtml Axis
These are the most common search queries used by the hackers. However, there is a big database of such queries available at HackersForCharity called Google Hacking Database. You can find more google dorks in this database.
I have to thank you for the efforts you’ve put in writing this blog.
I really hope to see the same high-grade blog posts from you in the future as well.
In fact, your creative writing abilities has motivated me to get my own blog now 😉
Good Informative Post.Thanks for sharing.
Awesome post brother.