Introduction to Google Dorking
In this article, I will introduce you to one of the most powerful techniques hackers use to gather information. Whether it’s a phone number, email address, social media accounts, subdomains, or much more—if it’s publicly available on the internet, I’ll show you how to find it.
The technique we’re discussing is known as Google Dorking or Google Hacking.
I will use real-life examples to illustrate why hacking is a superpower in today’s era.
What is Google Dorking or Google Hacking?
Also known as Google Advanced Search, Google Dorking involves using advanced search operators with regular search keywords to uncover hidden resources on the internet. These resources can include sensitive information such as usernames, passwords, credit card numbers, email addresses, shell scripts, user accounts, and more.
Think of it as a filter that helps you find exactly the information you are looking for.
To fully harness the power of this technique, you need to master some specialized search operators.
Power of Google Dorking
You can combine multiple operators to narrow down your search even further.
Example 1:
site:linkedin.com "@gmail.com" OR "+91" "Dell"
This query will find the number or email address or HR of Dell which is available on LinkedIn
Example 2:
intext:"murder" "gun" filetype:pdf since:2023–01–01 until:2024–07–1
This query will find you all the pdfs in which a murder and gun keyword is mentioned which is available on the internet from 01-01-2023 to 01-07-2024
Common Operators Used in Dorking
NOTE: One commonly used operator is quotation marks (“”). By enclosing a phrase within quotation marks, the search engine will only display results that include the exact words in the specified order. For example, searching “Ransomware attack 2024” will exclusively show results with the phrase “Ransomware attack 2024,” eliminating irrelevant information.
1. site:
Purpose: Search within a specific website or domain.
Example:
site:linkedin.com "John Doe"
This query will find pages related to “John Doe” within LinkedIn.
2. intitle:
Purpose: Find pages with a specific word in the title.
Example:
intitle:"index of" "password"
This query will look for pages with “index of” in the title that also mention “password”. Often, these pages contain directory listings that might have sensitive information.
3. inurl:
Purpose: Search for URLs containing a specific word.
Example:
inurl:admin
This query will find URLs that contain the word “admin”, which is useful for locating admin login pages.
4. filetype:
Purpose: Search for specific file types.
Example:
filetype:xls "contact list"
This query will find Excel files that mention “contact list”. These files might contain names, emails, or phone numbers.
5. cache:
Purpose: View Google’s cached version of a page.
Example:
cache:example.com
This query will show the cached version of example.com
.
6. related:
Purpose: Find websites related to a specific domain.
Example:
related:facebook.com
This query will display websites that are related to Facebook.
7. link:
Purpose: Find pages that link to a specific URL.
Example:
link:example.com
This query will find pages that link to example.com
.
8. intext:
Purpose: Find pages that contain a specific word in the text.
Example:
intext:"confidential"
This query will locate pages containing the word “confidential”.
9. allintext:
Purpose: Find pages containing all specified words in the text.
Example:
allintext:username password
This query will search for pages that have both “username” and “password” in the text, potentially revealing login credentials.
10. allintitle:
Purpose: Find pages with all specified words in the title.
Example:
allintitle:secure login
This query will find pages with both “secure” and “login” in the title, useful for finding secure login pages.
11. allinurl:
Purpose: Find URLs containing all specified words.
Example:
allinurl:admin login
This query will locate URLs that contain both “admin” and “login”.
12. define:
Purpose: Find definitions of words.
Example:
define:phishing
This query will display definitions of the word “phishing”.
13. before:
and after:
Purpose: Find pages published before or after a specific date.
Example:
data breach news before:2023
This query will find pages about data breaches published before 2023.
14. AROUND(X)
Purpose: Search for terms within X words of each other.
Example:
"cyber security" AROUND(5) "threats"
This query will find pages where “cyber security” and “threats” appear within 5 words of each other.
15. *
Purpose: Acts as a wildcard to replace any word.
Example:
"admin * login"
This query will find pages with phrases like “admin panel login”, “admin user login”, etc.
16. -
Purpose: Excludes pages containing the specified word.
Example:
"login page" -admin
This query will find pages with the phrase “login page” that do not contain the word “admin”.
17. OR
Purpose: Finds pages that match either of the specified terms.
Example:
"login" OR "sign in"
This query will find pages that contain either “login” or “sign in”.
18. info:
Purpose: Provides information about a specified URL.
Example:
info:example.com
This query will provide information about example.com
, including its cache, similar pages, and pages that link to it.
19. location:
Purpose: Limits search results to a specific location.
Example:
"restaurant" location:New York
This query will find restaurants in New York.
20. numrange:
Purpose: Searches for a range of numbers.
Example:
"camera $200..$500"
This query will find cameras priced between $200 and $500.
21. allinanchor:
Purpose: Finds pages with all the specified words in the anchor text of links.
Example:
allinanchor:blog tutorial
This query will find pages with links that have “blog” and “tutorial” in their anchor text.
22. daterange:
Purpose: Finds pages indexed within a specific date range (requires Julian dates).
Example:
data breach daterange:2458000-2458100
This query will find pages about data breaches indexed between these Julian dates.
23. source:
Purpose: Finds news from a specific source (used in Google News).
Example:
cybersecurity source:bbc
This query will find news articles about cybersecurity from BBC.
24. allinpostauthor:
Purpose: Finds blog posts written by a specific author.
Example:
allinpostauthor:"Jane Smith"
This query will find blog posts authored by Jane Smith.
25. allinblogtitle:
Purpose: Finds blog posts with specified words in the title.
Example:
allinblogtitle:travel tips
This query will find blog posts with “travel” and “tips” in the title.
Legal and Ethical Considerations
It’s crucial to use Google Dorking responsibly and ethically. Misusing this technique to access unauthorized information can lead to legal consequences and ethical breaches. Always ensure that your actions comply with the law and respect privacy.
Real-Life Examples and Case Studies
In 2020, a security researcher used Google Dorking to uncover sensitive data exposed by misconfigured servers. This led to the discovery of millions of personal records, highlighting the importance of proper data security practices.
Step-by-Step Guide
- Open Google Search.
- Enter your query using the appropriate operators.
- Analyze the results to find the information you need.
- Refine your search using additional operators or keywords if necessary.
Advanced Techniques and Tips
- Combine multiple operators for more precise searches.
- Use time filters to find the most recent information.
- Experiment with different combinations to uncover hidden data.
- Advance Google Search
Common Pitfalls and Mistakes
- Using too many operators can limit results.
- Overlooking legal and ethical boundaries.
- Not verifying the credibility of the information found.
Tools and Resources
- Google Dorking databases (e.g., Exploit-DB).
- Online forums and communities.
- Browser extensions for advanced search capabilities.
- Advance Google Search
Safety Measures
- Regularly update and patch your systems.
- Use strong, unique passwords.
- Implement security best practices to protect your data.
Conclusion and Future Trends
Google Dorking remains a powerful tool for information gathering. As technology evolves, so will the techniques used in Dorking. Staying informed about these advancements is key to leveraging this tool effectively and ethically.