Google Hacking Database – Google dorks

Google allows us penetration testers to query its search engine to our liking in order to reveal sensitive information regarding our target. The reference for finding all the interesting queries is on the Exploit-DB website at https://www.exploit-db.com/google-hacking-database/.

What can you search on Google? With Google dorks, you can query the search engine in order to accomplish the following:

  • Getting a foothold on a web server
  • Revealing sensitive directories
  • Searching for vulnerable files
  • Searching for vulnerable servers
  • Revealing verbose error messages
  • Searching for a target network's vulnerability data
  • Searching for miscellaneous devices that belong to your target (for example, IP cameras)
  • Getting web server information 
  • Searching for files with credentials (username or passwords) and files with confidential information
  • Searching for login pages (or admin pages)

Here's a list of the most popular Google dorks queries:

  • Search for domains/subdomainssite [target domain name]
  • Search for files: filetype [ file extension]
  • Search for strings in the URLinurl [ search criteria in the URL]
  • Search for strings in the titleintitle [search criteria in the title]
Remember that you can combine multiple queries together to get the desired results.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.153.38