DEV Community

Sh Raj
Sh Raj

Posted on

The Ultimate Guide to Google Dorking: All Types & Techniques

πŸ” The Ultimate Guide to Google Dorking: All Types & Techniques

Google Dorking (also known as Google Hacking) is the art of using advanced search operators in Google to find information that isn't easily accessible through normal search queries. Security researchers, ethical hackers, and OSINT (Open Source Intelligence) investigators use it to uncover hidden data, misconfigured servers, leaked credentials, and more.

⚠️ Disclaimer: Google Dorking can reveal sensitive or confidential information. Always use it ethically and legally. Unauthorized access or misuse is illegal.


🧠 What is Google Dorking?

Google Dorking uses special search operators (called Google Dorks) to refine results and uncover pages, files, or configurations that shouldn't be publicly visible. These operators can be combined to perform powerful searches.


πŸ”§ Basic Google Search Operators

Operator Function Example
"..." Exact match "login page"
OR Logical OR password OR passcode
- Exclude keyword admin -login
* Wildcard "file * admin"
() Grouping (admin OR login) password
.. Number range site:.edu 2010..2024

🌐 Site-Specific Operators

1. site:

Limits search to a specific domain.

site:example.com 
Enter fullscreen mode Exit fullscreen mode

Use cases:

  • Find all indexed pages on a website.
  • Discover hidden subdomains.
  • Check for sensitive directories.

πŸ“ File Type Operators

2. filetype: / ext:

Find specific file types (PDF, DOCX, XLS, SQL, etc.).

filetype:pdf "confidential" ext:xls site:gov.in 
Enter fullscreen mode Exit fullscreen mode

Use cases:

  • Discover confidential documents.
  • Extract financial data.
  • Find resumes or credentials.

πŸ•³ Directory and Indexing

3. intitle:"index of"

Used to find directory listings on misconfigured servers.

intitle:"index of" "backup" 
Enter fullscreen mode Exit fullscreen mode

Common targets:

  • backup
  • passwords
  • admin
  • db

πŸ” Login and Admin Portals

4. intitle:login / inurl:admin / intext:password

intitle:"login" site:gov inurl:"admin/login" intext:"username" filetype:log 
Enter fullscreen mode Exit fullscreen mode

Finds:

  • Admin login panels
  • Exposed credentials in logs
  • Misconfigured CMS backends

πŸ”Ž Cached and Archived Pages

5. cache:

See the cached version of a page by Google.

cache:example.com/admin 
Enter fullscreen mode Exit fullscreen mode

Useful for:

  • Accessing removed content
  • Viewing past versions

🧬 Information Disclosure

6. intext:, intitle:, inurl:

Search for keywords in page content, title, or URL.

intext:"confidential" filetype:pdf intitle:"phpinfo" inurl:"/phpmyadmin" 
Enter fullscreen mode Exit fullscreen mode

πŸ“Š Vulnerable Devices and Technologies

7. allinurl:, allintitle:, allintext:

These apply the operator to all terms in the query.

allinurl:"admin login" allintitle:"webcam 7" 
Enter fullscreen mode Exit fullscreen mode

πŸ’₯ Advanced Exploits (For Pen Testers)

8. Database Leaks

filetype:sql intext:"password" -github 
Enter fullscreen mode Exit fullscreen mode

9. Exposed Cameras

inurl:view/index.shtml intitle:"webcamXP" 
Enter fullscreen mode Exit fullscreen mode

10. Exposed Git and SVN Repos

intitle:"Index of" /.git intitle:"Index of" /.svn 
Enter fullscreen mode Exit fullscreen mode

🧾 Configuration Files & Source Code

11. Common Leaks

filetype:env intext:"APP_KEY" filetype:log intext:"error" filetype:conf intext:"password" 
Enter fullscreen mode Exit fullscreen mode

Targets:

  • .env
  • .log
  • .bak, .old, .swp
  • config.php
  • wp-config.php

πŸ›‘ Security & CVE Hunting

12. Find Vulnerable Software Versions

intitle:"index of" "apache/2.4.1" intitle:"Welcome to JBoss" 
Enter fullscreen mode Exit fullscreen mode

Combine with known CVEs to identify vulnerable installations.


πŸ—„ Google Dork Categories

Category Dork Example
Login Portals inurl:login
Exposed Docs filetype:pdf confidential
Directory Listings intitle:"index of" /admin
Error Messages intext:"sql syntax"
Admin Panels inurl:admin
Database Dumps filetype:sql intext:password
Security Cameras inurl:top.htm inurl:currenttime
IoT Devices intitle:webcamXP

🧰 Useful Google Dork Tools

  1. Exploit-DB Google Hacking Database (GHDB)
    A massive repository of curated dorks.

  2. GitHub Projects

  • GoogleDorker
  • Osmedeus
  • GHDB-CLI
  1. Browser Extensions / Scripts
  • Google Hacking GUI
  • PassiveRecon plugin

πŸ” Use Cases in Ethical Hacking

  • Reconnaissance in penetration testing.
  • Discovering exposed sensitive files (e.g., credentials.xlsx).
  • Finding open cameras and misconfigured cloud storages.
  • Social engineering prep (finding email addresses, names, logs).

❌ What NOT to Do

  • Don’t attempt to access non-public systems or data.
  • Don’t exploit vulnerabilities without permission.
  • Don’t perform mass scans on live systems.
  • Never try to brute-force or bypass authentication.

πŸ§‘β€πŸŽ“ Tips for Beginners

  • Combine multiple operators for precision:
 site:gov filetype:xls intext:"password" 
Enter fullscreen mode Exit fullscreen mode
  • Look for patterns like:

    • backup
    • 2020 data
    • confidential
    • credentials
  • Practice on your own test domains or legal bug bounty targets.


πŸ“š Further Learning


🏁 Final Thoughts

Google Dorking is a powerful skill for security professionals, bug bounty hunters, and researchers. With responsible use, it can reveal misconfigurations and protect systems before malicious actors exploit them.

Always follow ethical guidelines and get permission before probing real-world targets.

Top comments (0)