HackingTechnology

Google Dorks: Exploring their types and how to use them [Cheatsheet]

In the vast world of online search, there are more advanced ways to search for specific information that go beyond simply entering keywords into a search engine. One of these more sophisticated search techniques has become popular in the field of computer security and information investigation, the Google Dorks.

We are talking about a series of commands and techniques that allow users to find hidden and sensitive information more accurately and effectively.

In this article, we will explore the different ways in which users can expand their search skills online; discover valuable data without relying solely on conventional searches. Read until the end and become an expert in finding information on the Internet.

It is important to note that dorks must be used ethically and legally. Using dorks to access, exploit, or compromise systems without authorization is an illegal activity and a violation of privacy and security. Dorks are a powerful tool, but their use must be in line with established ethical and legal principles..

We will begin by making it clear to you what a Dork is in Computer Science

It is nothing more than a specialized search string used to find specific information through search engines, such as Google. These search strings, also known as “Google dorks” or simply “dorks”, allow users to perform more advanced and precise searches for discover hidden or sensitive information that would not be easily accessible through conventional searches.

Learn about Google Dorks and how they are used

Dorks are made up of specific keywords and operators that are entered into a search engine to filter results for specific information. For example, a dork may be designed to search for exposed directories, leaked passwords, sensitive files, or websites vulnerable to attack. Dorks are widely used by security experts, researchers, and ethical hackers to find and assess potential vulnerabilities in systems and applications.

What are the types of Google Dorks and how are they used?

Google Dorks are a powerful tool. These advanced search commands allow users to perform more specific searches and discover information that would not normally be accessible in a conventional way. Here the most important:

Basic Google Dorks

The Basic Google Dorks are the simplest and most commonly used search commands. These dorks focus on searching for specific keywords on web pages and can be useful for finding specific information. Some examples of basic Google Dorks are:

  • Title: Allows you to search for keywords in the title of a web page. For example, "intitle:hackers" will display all pages that contain the word "hackers" in their title.
  • inurl: This dork looks for keywords in the URLs of web pages. For example, "inurl:admin" will display all pages that contain the word "admin" in their URL.
  • filetype: Search for specific files based on their type. For example, “filetype:pdf” will display all PDF files related to the specified keyword.

advanced dorks

Advanced Google Dorks go beyond basic searches and allow deeper exploration of the web. These dorks are designed to find more sensitive or specific information.. Some examples of advanced Google Dorks are:

  • Site: This dork allows you to search for specific information on a particular website. For example, “site:example.com password” will return all pages on example.com that contain the word “password”.
  • cache: This dork shows the cached version of a web page. It is useful when you want to access a page that has been removed or is currently unavailable.
  • Link: This dork shows the pages that link to a specific URL. It can be useful for finding related websites or discovering backlinks.

Dorks for computer security

Google Dorks are also widely used in the field of computer security to search for vulnerabilities, exposures, and sensitive data. Some examples of Google Dorks used in computer security are:

  • Password: This dork looks for web pages that contain exposed password files or vulnerable directories.
  • Shodan: Used to search for Internet-connected devices through the Shodan search engine. For example, “shodan:webcam” will show publicly accessible web cameras.
  • “Index of”: Searches file index directories on web servers, which can expose sensitive or private files.

Dorks for information research

Google Dorks are also valuable tools for information research and data collection. Some examples of Google Dorks used in information research are:

  • "intext:": This dork allows you to search for a specific word or phrase within the content of a web page. For example, "intext:OpenAI" will display all pages that contain the word "OpenAI" in their content.
  • “inanchor:” Look for specific keywords in web page links. It can be useful for finding websites related to a specific topic or keyword.
  • related:: Display websites related to a specific URL or domain. It can help discover websites that are similar or related to a particular topic.

Dorks to search for vulnerabilities

Google Dorks are also used to search for vulnerabilities in websites and apps. These dorks are designed to find websites that may be susceptible to attacks or information leaks. Some examples of Google Dorks used in the search for vulnerabilities are:

  • SQL Injection: This dork looks for websites that may be vulnerable to SQL injection attacks.
  • “XSS”: This scans for websites that may be vulnerable to cross-site scripting (XSS) attacks.
  • File Upload: Looks for websites that allow file uploads, which can be a potential vulnerability if not implemented correctly.

Some Frequently Asked Questions and their answers about Google Dorks

As we want you not to have any doubts about these tools, here we leave you the best answers to your doubts:

Is it legal to use Google Dorks?

The use of Google Dorks itself is legal. However, it is important to use them ethically and responsibly. Using dorks for illegal activities, such as unauthorized access to systems, violating privacy or committing fraud, is illegal and is not allowed.

What are the risks of using Google Dorks?

Improper or irresponsible use of Google Dorks can have negative consequences, such as violating the privacy of others, accessing sensitive information without permission, or engaging in illegal activities. It is critical to understand the ethical and legal limits when using these tools.

What are the ethical uses of Google Dorks?

Ethical uses of Google Dorks include identifying and remediating vulnerabilities in systems and applications, evaluating a website's security, and finding exposed information to notify owners and help protect privacy and security.

How can I learn to use Google Dorks effectively?

You can learn to use Google Dorks effectively through research, reading documentation, participating in computer security communities and forums, and practice. There are online resources, tutorials, and courses that can help you improve your skills in using Google Dorks.

Google Dork TypeGoogle Dork Example
Basic Searchintitle:”keyword”
inurl:"keyword"
filetype:”file type”
site:”domain.com”
cache:”URL”
link: “URL”
Informatic securityintext:"SQL error"
intext:”password leaked”
intext:”security settings”
inurl:”admin.php”
intitle:”control panel”
site:”domain.com” ext:sql
Confidential informationintext:"confidential information"
intitle:”password file”
filetype:docx “confidential”
inurl:”file.pdf” intext:”social security number”
inurl:”backup” ext:sql
intitle:”directory index”
website explorationsite:domain.com “login”
site:domain.com “index of”
site:domain.com intitle:”password file”
site:domain.com ext:php intext:”SQL error”
site:domain.com inurl:”admin”
site:domain.com filetype:pdf
Othersallinurl:”keyword”
allintext:”keyword”
related:domain.com
info:domain.com
define:”term”
phonebook:”contact name”
citeia.com

Are there alternatives to this tool for advanced searches?

Yes, there are other tools and techniques to perform advanced searches, such as Bing dorks, Yandex dorks or Shodan (for searching for Internet-connected devices). Each one has its specific characteristics and approaches.

How can I protect my website or app from being found by Google Dorks?

To protect your website or app from being found by Google Dorks, it's important to implement good security practices, such as making sure sensitive directories and files are protected, keeping software up-to-date, applying good security settings, and performing penetration tests to identify possible vulnerabilities.

What security measures should I take if I find that my website is vulnerable through Google Dorks?

If you discover that your website is vulnerable through Google Dorks, it's important to take immediate action to fix the vulnerabilities. This may include patching the system, fixing configuration errors, restricting unauthorized access, and improving the overall security of the site.

Can they be used in other search engines besides Google?

While Google Dorks are commands designed to be used on the Google search engine, some of the operators and techniques can be applied to other search engines as well. However, it is important to note the differences in syntax and results between search engines.

How can I use Google Dorks to search for vulnerabilities in websites?

You can use Google Dorks to search for vulnerabilities in websites by identifying specific patterns in URLs, searching for exposed directories, searching for sensitive files, or looking for error messages that may reveal sensitive information. It is important to do so ethically and respecting the privacy of others.

Are there online communities or forums where Google Dorks are discussed and shared?

Yes, there are online communities and forums where information security professionals and enthusiasts share information, techniques, and discuss the use of Google Dorks. These spaces can be useful for learning, sharing knowledge and keeping up with the latest trends in the use of dorks.

Some forums and online communities where knowledge about the use of Google Dorks and computer security are discussed and shared are these:

  1. Exploit Database Community: An online community dedicated to computer security and the sharing of information about vulnerabilities and exploits. (https://www.exploit-db.com/)
  2. Reddit – r/NetSec: A subreddit dedicated to computer security, where professionals and enthusiasts share security-related news, discussions, and techniques. (https://www.reddit.com/r/netsec/)
  3. HackerOne Community: A community of ethical hackers and security professionals online, where vulnerabilities, security techniques are discussed, and findings are shared. (https://www.hackerone.com/community)
  4. The Ethical Hacker Network: An online community for information security professionals and ethical hackers, where resources are shared, techniques are discussed, and collaborations are made. (https://www.ethicalhacker.net/)
  5. SecurityTrails Community Forum: An online security forum where security professionals and enthusiasts discuss computer security related topics, including the use of Google Dorks. (https://community.securitytrails.com/)

Google Dork TypeGoogle Dork Example
Basic Searchintitle:”keyword”
inurl:"keyword"
filetype:”file type”
site:”domain.com”
cache:”URL”
link: “URL”
Informatic securityintext:"SQL error"
intext:”password leaked”
intext:”security settings”
inurl:”admin.php”
intitle:”control panel”
site:”domain.com” ext:sql
Confidential informationintext:"confidential information"
intitle:”password file”
filetype:docx “confidential”
inurl:”file.pdf” intext:”social security number”
inurl:”backup” ext:sql
intitle:”directory index”
website explorationsite:domain.com “login”
site:domain.com “index of”
site:domain.com intitle:”password file”
site:domain.com ext:php intext:”SQL error”
site:domain.com inurl:”admin”
site:domain.com filetype:pdf
Othersallinurl:”keyword”
allintext:”keyword”
related:domain.com
info:domain.com
define:”term”
phonebook:”contact name”

Leave your comment

Your email address will not be published. Required fields are marked with *

This site uses Akismet to reduce spam. Learn how your comment data is processed.