Tech news #13 What is Google Docs, how to use Google dorks hacking Complete information
![]() |
What is the google dorks |
What is google dorks
hello my dear colleagues, I made a visit to nullbyte and found that there is not a complete tutorial about the google dorks, so I felt the need for this tutorial, and seeing that there are many newbies around, so here's a tutorial that will teach you how to use google to hack.Buy Now- Oppo A74 5G smartphone Buy now
Google: If you still do not know what is google, then you need to take a crash course in "how to use the internet"
Dork:Someone who has odd interests, and is often silly at times.
A dork is also someone who can be themselves and not care what anyone thinks
In my opinion A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet.
As a passive attack method, Google dorking can return usernames and passwords, email lists, sensitive documents, personally identifiable financial information (PIFI) and website vulnerabilities
Lets take a look at the special google search operators that are used to construct those high powered google hack search terms.
intitle
Specifying intitle, will tell google to show only those pages that have the term in their html title. For example intitle:"login page" will show those pages which have the term "what is dorks" in the title text.
allintitle
Similar to intitle, but looks for all the specified terms in the title.
inurl
Searches for the specified term in the url. For example inurl:"what is dorks.php".
allinurl
Same as inurl, but searches for all terms in the url
filetype
Searches for specific file types. filetype:pdf will looks for pdf files in websites. Similarly filetype:txt looks for files with extension .txt
Similar to filetype. ext:pdf finds pdf extension files.
intext
Searches the content of the page. Somewhat like a plain google search. For example intext:"index of /".
allintext
Similar to intext, but searches for all terms to be present in the text.
site
Limits the search to a specific site only. site:nullbyte.com
The process can be a little time consuming, but the outcome will be worth it after learning on how to use dorks.
Basic Formula of dork,
"inurl:."domain"/"dorks" "
So you would normally understand it like this:
"inurl" = input URL
"domain" = your desired domain ex. .gov
"dorks" = your dork of your choice
Here is another example of that
You can use following words instead of inurl :
All these also help yo find other things then vulnerables.
Anyway now I am going to explain you how to use some for finding vulnerability in websites.
INTITLE:
You can use the intitle to find anything in the title of the website. Which also could be usefull to find downloads or anything else.
intitle: index blog post
This is an example to index blog post songs for free
INURL:
The inurl basicly looks for anything after the : in the site urls.
inurl:wwwgetmetrix.com
INTEXT:
you can find literally everything using intext, you could even use the inurl dorks whit this.
intext:"Design & Developed By Seawind Solution Pvt.Ltd."
Google will give you all the websites created by IT Masons taht recently has bypass Admin Page Vulnerability in some websites,
to try just choose a target from google and add this to the url /adminpanel/
And fill username and password like the information below :
Username : '=' 'OR'
Password : '=' 'OR'
and you will get the admin panel of the website some example:
DEFINE
Google will define this massage and will look for what had this error for example,
define:"sql syntax error"
SITE:
Obvious, when we will use it, google will looks for a site .
site:aatishayjain.com
Google will look for any site related with wonderhowto.
PHONEBOOK:
It will look for the phone number related to me, so use your victims name or yours instead.
phonebook:ActorAtishay
MAPS:
Google will look on google maps for your search
BOOKS:
Google has an online library store. If you want to find interesting books use this dorks
book:comics book
This will look for any book gogole hase indexed whith java language in it.
FROOGLE:
Used for froogle search instead of google.
INFO:
google looks for anything you inputted but only information about string which you have puted next to info: .
info:actorAtishay
Above dork will show you alot off things about firefox like what is firefox etc.
MOVIE:
You can find information about movies on google using this dork.
movie:watch radhe movie online
WEATHER:
You can find information about weather on google using this dork.
RELATED:
This will look for anything related to what you have entered next to related: .
related:hacking
Google responds whith sites about hacking stuffs.
LINK:
This one will works better instead of only looking in search url, it will also look in the site for urls that possibly are vulnerable.
link:Getmetrix.blogspot.com
This is verry usefull I would say even more then inurl.
Vulnerability Approach :
Once you search website using above dorks, now its time to check whether the website is vulnerable to SQL injection or not, we simply put in a quote " ' " at the end of the url address.
So our site will look like this,;
#1.Googaldorks History
The concept of "Google Hacking" dates back to 2002, when Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems and/or sensitive information disclosures - labeling them googleDorks. some people call it googlehacking.InternetGoogle: If you still do not know what is google, then you need to take a crash course in "how to use the internet"
Dork:Someone who has odd interests, and is often silly at times.
A dork is also someone who can be themselves and not care what anyone thinks
In my opinion A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet.
As a passive attack method, Google dorking can return usernames and passwords, email lists, sensitive documents, personally identifiable financial information (PIFI) and website vulnerabilities
That information can be used for any number of illegal activities, including cyberterrorism, industrial espionage,identity theft and cyberstalking
#2.Googaldorks Operators
as well as programming, google dorks also has its operators, I will not be able to show all operators but here are the most commonly used Operators.Lets take a look at the special google search operators that are used to construct those high powered google hack search terms.
intitle
Specifying intitle, will tell google to show only those pages that have the term in their html title. For example intitle:"login page" will show those pages which have the term "what is dorks" in the title text.
allintitle
Similar to intitle, but looks for all the specified terms in the title.
inurl
Searches for the specified term in the url. For example inurl:"what is dorks.php".
allinurl
Same as inurl, but searches for all terms in the url
filetype
Searches for specific file types. filetype:pdf will looks for pdf files in websites. Similarly filetype:txt looks for files with extension .txt
Similar to filetype. ext:pdf finds pdf extension files.
intext
Searches the content of the page. Somewhat like a plain google search. For example intext:"index of /".
allintext
Similar to intext, but searches for all terms to be present in the text.
site
Limits the search to a specific site only. site:nullbyte.com
#3.The formula of google dorks
Dorks : They are like search criteria in which a search engine returns results related to your dork.The process can be a little time consuming, but the outcome will be worth it after learning on how to use dorks.
Basic Formula of dork,
"inurl:."domain"/"dorks" "
So you would normally understand it like this:
"inurl" = input URL
"domain" = your desired domain ex. .gov
"dorks" = your dork of your choice
Here is another example of that
You can use following words instead of inurl :
- intitle:
- inurl:
- intext:
- define:
- site:
- phonebook:
- maps:
- book:
- froogle:
- info:
- movie:
- weather:
- related:
- link:
All these also help yo find other things then vulnerables.
Anyway now I am going to explain you how to use some for finding vulnerability in websites.
INTITLE:
You can use the intitle to find anything in the title of the website. Which also could be usefull to find downloads or anything else.
intitle: index blog post
This is an example to index blog post songs for free
INURL:
The inurl basicly looks for anything after the : in the site urls.
inurl:wwwgetmetrix.com
INTEXT:
you can find literally everything using intext, you could even use the inurl dorks whit this.
intext:"Design & Developed By Seawind Solution Pvt.Ltd."
Google will give you all the websites created by IT Masons taht recently has bypass Admin Page Vulnerability in some websites,
to try just choose a target from google and add this to the url /adminpanel/
And fill username and password like the information below :
Username : '=' 'OR'
Password : '=' 'OR'
and you will get the admin panel of the website some example:
DEFINE
Google will define this massage and will look for what had this error for example,
define:"sql syntax error"
SITE:
Obvious, when we will use it, google will looks for a site .
site:aatishayjain.com
Google will look for any site related with wonderhowto.
PHONEBOOK:
It will look for the phone number related to me, so use your victims name or yours instead.
phonebook:ActorAtishay
MAPS:
Google will look on google maps for your search
BOOKS:
Google has an online library store. If you want to find interesting books use this dorks
book:comics book
This will look for any book gogole hase indexed whith java language in it.
FROOGLE:
Used for froogle search instead of google.
INFO:
google looks for anything you inputted but only information about string which you have puted next to info: .
info:actorAtishay
Above dork will show you alot off things about firefox like what is firefox etc.
MOVIE:
You can find information about movies on google using this dork.
movie:watch radhe movie online
WEATHER:
You can find information about weather on google using this dork.
RELATED:
This will look for anything related to what you have entered next to related: .
related:hacking
Related:researching
Google responds whith sites about hacking stuffs.
LINK:
This one will works better instead of only looking in search url, it will also look in the site for urls that possibly are vulnerable.
link:Getmetrix.blogspot.com
This is verry usefull I would say even more then inurl.
Vulnerability Approach :
Once you search website using above dorks, now its time to check whether the website is vulnerable to SQL injection or not, we simply put in a quote " ' " at the end of the url address.
So our site will look like this,;
#4. Dorks Some Extras
As far as I have researched, Google Dorks can help us get data from many websites. These are some of the Google Dorks that can affect our online business:
Google dorks are very important, so I recommend that before starting your exploits against a particular victim the best way is to use Google and see what you can find about the victim, and believe me Do, using Google, I did not do this many times, even turned on Linux Kali, by simple search on Google, I found the password of my victim.
Google dorks are very important, so I recommend that before starting your exploits against a particular victim the best way is to use Google and see what you can find about the victim, and believe me Do, using Google, I did not do this many times, even turned on Linux Kali, by simple search on Google, I found the password of my victim.
wow this saintly however ,I love your enter plus nice pics might be part personss negative love being defrent mind total poeple , TFT Best Comps
ReplyDeleteMmm.. estimable to be here in your report or notify, whatever, I repute I should moreover process strong for my have website want I play some salubrious further updated busy in your location. TFT Best Comps
ReplyDeletePornhub MOD APK modyolo
ReplyDeletefoxi mod apk
momix mod APK DOWNLOAD
sony liv Premium Mod Apk Technical ATG
Mix root mods
I really thank you for the valuable info on this great subject and look forward to more great posts. Thanks a lot for enjoying this beauty article with me. I am appreciating it very much! Looking forward to another great article. Good luck to the author! All the best! cryptocurrency
ReplyDelete