Hackers use the Google search engine to find Vulnerable systems (Be it a database, website, security cameras, or any IoT gadget) with the help of some special search queries. There are many Google search engine queries that can uncover vulnerable systems and/or sensitive information disclosures. These queries are known as Google Dorks. Note: This article is only for educational purposes. You can use this knowledge to increase your system’s security or for any ethical purpose.
What is Google Dork or Google Dorking?
In 2002, Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems or sensitive information disclosures. He labeled them Google dorks. Some people call it Google hacking. Google Dorking is the method for finding vulnerable targets using Google dorks. Google Dorking can return usernames and passwords, email lists, sensitive documents, and website vulnerabilities. Ethical Hackers use Google Dorking to improve system security. Black hat hackers use this technique for illegal activities, including cyber terrorism, industrial espionage, and identity theft. Google dorks can find Footholds, Sensitive Directories, Vulnerable Files, Vulnerable Servers, Network or Vulnerability Data, Various Online Devices, Files Containing Usernames and Passwords, Sensitive Online Shopping Info and Pages Containing Login Portals.
List of Google Dork Queries (Updated List)
Google dork Queries are special search queries that can be searched as any other query you search on the Google search engine. You just need to type the query in the Google search engine along with the specified parameters.
1. Google Dorks For Hacking websites
intitle: This dork will tell Google to show only those pages that have the term in their HTML title. For example: intitle:”login page” will show those pages which have the term “login page” in the title text. allintitle: It is similar to intitle but looks for all the specified terms in the title. For example: allintitle:”login page” inurl: It searches for the specified term in the URL. For example inurl:”login.php” and inurl:proftpdpasswd allinurl: It is similar to inurl but looks for all the specified terms in the URL. For example: allinurl:”login.php”. define: Google will define this message and will look for what had this error. For example: define:”sql syntax error” site: This dork will return all the pages of a particular website that is crawled by Google. For example, site:technotification.com. link: It will also look in the site for URLs that possibly are vulnerable to SQL injection. For example: link:index.php?id=
2. Google Dorks For Hacking Files
filetype: Searches for specific file types. filetype:pdf will look for pdf files in websites. filetype:txt looks for files with .txt extension. This way you can search for a file with any extension like mp4, mp3, Mkv, etc. site:onedrive.live.com shared by intitle: You can look into file directories of websites directly and download specified file intitle: index of mp3 for mp3 files. You can replace mp3 with any other extension. You can also use to find any particular movie or game. intitle: “index of ” intext: “movie name” . book: find any book using Google search engine. for example book: java
3. Google Dorks for finding username and passwords
intext: passwords filetype: txt mysql history files intext: account details filetype: txt intitle:index.of intext:”secring .skr”|&q… people.lst passwd master.passwd pwd.db htpasswd / htpasswd.bak htpasswd / htgroup spwd.db / passwd passwd / etc (reliable) config.php passlist
4. Google Dorks For Hacking Security Cameras
Type any of these queries into google to find vulnerable security cameras
Inurl:”CgiStart?page=” inurl:/view.shtml intitle:”Live View / – AXIS inurl:view/view.shtml inurl:ViewerFrame?Mode= inurl:ViewerFrame?Mode=Refresh inurl:axis-cgi/jpg inurl:axis-cgi/mjpg (motion-JPEG) (disconnected) inurl:view/indexFrame.shtml inurl:view/index.shtml inurl:view/view.shtml liveapplet intitle:”live view” intitle:axis intitle:liveapplet allintitle:”Network Camera NetworkCamera” (disconnected) intitle:axis intitle:”video server” intitle:liveapplet inurl:LvAppl intitle:”EvoCam” inurl:”webcam.html” intitle:”Live NetSnap Cam-Server feed” intitle:”Live View / – AXIS” inurl:indexFrame.shtml Axis
These are the most common search queries used by the hackers. However, there is a big database of such queries available at HackersForCharity called Google Hacking Database. You can find more google dorks in this database.