Google Dorks Practical Tutorial


In this video tutorial, I'll show you how hackers use Google Dorks to find sensitive information & vulnerable services. The link to the previous tutorial made on the same topic is given below in the description box.

Now let's have a look at the basic Google Operators, that are used as a dork/dorks----


site: to denote a specific site

intitle: you can use a keyword here, that is present in the title of that particular webpage

inurl: it only shows those results which contains the keyword in their URL

intext: the keyword that contains in text (in text format)

filetype: it denotes the file type or file extension you want to see in the search results.


Now let's look at some google dorks made by combining these basic Google Search operators


intitle:"index of" inurl:ftp after:2018

intitle:"index of" inurl:http after:2018

This dork will show you some results of site directories that are indexed in google by mistake, because the

"Parent Directory" & other critical directories should only be visible & accessible to site owners.

------------------------------------SHOW PRACTICAL EXAMPLE--------------------------------------------

allintext:password filetype:log after:2018

using this dork you can find out some log files, exposed to internet!

filetype:env "DB_PASSWORD" after:2018

The most interesting thing is you can also find vulnerabile website's configuration file.

filetype:xls inurl:"email.xls"

You can find email list using the above dork...

inurl:top.htm inurl:currenttime

Find vulnerable cameras


415 views0 comments

Recent Posts

See All


  • Facebook Basic Black
  • Twitter Basic Black
  • Black Instagram Icon