π The Ultimate Guide to Google Dorking: All Types & Techniques
Google Dorking (also known as Google Hacking) is the art of using advanced search operators in Google to find information that isn't easily accessible through normal search queries. Security researchers, ethical hackers, and OSINT (Open Source Intelligence) investigators use it to uncover hidden data, misconfigured servers, leaked credentials, and more.
β οΈ Disclaimer: Google Dorking can reveal sensitive or confidential information. Always use it ethically and legally. Unauthorized access or misuse is illegal.
π§ What is Google Dorking?
Google Dorking uses special search operators (called Google Dorks) to refine results and uncover pages, files, or configurations that shouldn't be publicly visible. These operators can be combined to perform powerful searches.
π§ Basic Google Search Operators
Operator | Function | Example |
---|---|---|
" ..." | Exact match | "login page" |
OR | Logical OR | password OR passcode |
- | Exclude keyword | admin -login |
* | Wildcard | "file * admin" |
() | Grouping | (admin OR login) password |
.. | Number range | site:.edu 2010..2024 |
π Site-Specific Operators
1. site:
Limits search to a specific domain.
site:example.com
Use cases:
- Find all indexed pages on a website.
- Discover hidden subdomains.
- Check for sensitive directories.
π File Type Operators
2. filetype:
/ ext:
Find specific file types (PDF, DOCX, XLS, SQL, etc.).
filetype:pdf "confidential" ext:xls site:gov.in
Use cases:
- Discover confidential documents.
- Extract financial data.
- Find resumes or credentials.
π³ Directory and Indexing
3. intitle:"index of"
Used to find directory listings on misconfigured servers.
intitle:"index of" "backup"
Common targets:
backup
passwords
admin
db
π Login and Admin Portals
4. intitle:login
/ inurl:admin
/ intext:password
intitle:"login" site:gov inurl:"admin/login" intext:"username" filetype:log
Finds:
- Admin login panels
- Exposed credentials in logs
- Misconfigured CMS backends
π Cached and Archived Pages
5. cache:
See the cached version of a page by Google.
cache:example.com/admin
Useful for:
- Accessing removed content
- Viewing past versions
𧬠Information Disclosure
6. intext:
, intitle:
, inurl:
Search for keywords in page content, title, or URL.
intext:"confidential" filetype:pdf intitle:"phpinfo" inurl:"/phpmyadmin"
π Vulnerable Devices and Technologies
7. allinurl:
, allintitle:
, allintext:
These apply the operator to all terms in the query.
allinurl:"admin login" allintitle:"webcam 7"
π₯ Advanced Exploits (For Pen Testers)
8. Database Leaks
filetype:sql intext:"password" -github
9. Exposed Cameras
inurl:view/index.shtml intitle:"webcamXP"
10. Exposed Git and SVN Repos
intitle:"Index of" /.git intitle:"Index of" /.svn
π§Ύ Configuration Files & Source Code
11. Common Leaks
filetype:env intext:"APP_KEY" filetype:log intext:"error" filetype:conf intext:"password"
Targets:
.env
.log
-
.bak
,.old
,.swp
config.php
wp-config.php
π‘ Security & CVE Hunting
12. Find Vulnerable Software Versions
intitle:"index of" "apache/2.4.1" intitle:"Welcome to JBoss"
Combine with known CVEs to identify vulnerable installations.
π Google Dork Categories
Category | Dork Example |
---|---|
Login Portals | inurl:login |
Exposed Docs | filetype:pdf confidential |
Directory Listings | intitle:"index of" /admin |
Error Messages | intext:"sql syntax" |
Admin Panels | inurl:admin |
Database Dumps | filetype:sql intext:password |
Security Cameras | inurl:top.htm inurl:currenttime |
IoT Devices | intitle:webcamXP |
π§° Useful Google Dork Tools
Exploit-DB Google Hacking Database (GHDB)
A massive repository of curated dorks.GitHub Projects
GoogleDorker
Osmedeus
GHDB-CLI
- Browser Extensions / Scripts
- Google Hacking GUI
- PassiveRecon plugin
π Use Cases in Ethical Hacking
- Reconnaissance in penetration testing.
- Discovering exposed sensitive files (e.g.,
credentials.xlsx
). - Finding open cameras and misconfigured cloud storages.
- Social engineering prep (finding email addresses, names, logs).
β What NOT to Do
- Donβt attempt to access non-public systems or data.
- Donβt exploit vulnerabilities without permission.
- Donβt perform mass scans on live systems.
- Never try to brute-force or bypass authentication.
π§βπ Tips for Beginners
- Combine multiple operators for precision:
site:gov filetype:xls intext:"password"
-
Look for patterns like:
backup
2020 data
confidential
credentials
Practice on your own test domains or legal bug bounty targets.
π Further Learning
π Final Thoughts
Google Dorking is a powerful skill for security professionals, bug bounty hunters, and researchers. With responsible use, it can reveal misconfigurations and protect systems before malicious actors exploit them.
Always follow ethical guidelines and get permission before probing real-world targets.
Top comments (0)