What is Google Dorking?

Google Dorking, also known as "Google Hacking", is a technique used to discover sensitive information exposed on the internet using advanced Google search queries. It’s widely used in reconnaissance to locate misconfigurations, exposed files, login portals, and more.

πŸ”° Basic Search Operators

These are the building blocks of Google Dorking:

πŸ’‘ Advanced Google Dorking Techniques

Find Exposed Login Pages

inurl:admin login site:example.com

This dork searches for URLs containing "admin" and "login" on the target domain.

Discover Open Directories

intitle:"index of" "parent directory" site:example.com

Reveals directory listings where files might be publicly accessible.

Find Exposed Database Files

filetype:sql site:gov

Searches for downloadable SQL database files on government domains.

Locate Publicly Exposed Passwords

intext:"password=" filetype:log

Finds .log files containing password data exposed in plain text.

Discover Camera Feeds

inurl:view/index.shtml

Common path used by unsecured network cameras with live feeds.

🧠 Step-by-Step Usage Guide

  1. Identify your objective – e.g., find PDFs, logins, or public IP cams.
  2. Choose a combination of operators based on your goal.
  3. Test your dorks on known domains or targets (with permission).
  4. Analyze the results manually or automate using tools.
  5. Document useful findings and filter out false positives.

🌍 Real-World Example

Let’s say you're performing recon on a university website:

site:*.edu filetype:xls intext:"student grades"

This could potentially uncover Excel files with sensitive data like student grades exposed on public directories.

πŸš€ Pro Tips

πŸ› οΈ Tools for Automation

βš–οΈ Legal & Ethical Considerations

Google Dorking must always be used within legal boundaries. Searching public content is legal, but accessing, storing, or distributing sensitive data without permission may be considered a cybercrime. Always get written consent before testing real organizations.