Google Dorks Practical Tutorial

WELCOME TO GOOGLE DORKS EP-02



In this video tutorial, I'll show you how hackers use Google Dorks to find sensitive information & vulnerable services. The link to the previous tutorial made on the same topic is given below in the description box.



Now let's have a look at the basic Google Operators, that are used as a dork/dorks----

-----------------------------------------------------------------------------------------------------

site: to denote a specific site

intitle: you can use a keyword here, that is present in the title of that particular webpage

inurl: it only shows those results which contains the keyword in their URL

intext: the keyword that contains in text (in text format)

filetype: it denotes the file type or file extension you want to see in the search results.

-----------------------------------------------------------------------------------------------------


Now let's look at some google dorks made by combining these basic Google Search operators

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

intitle:"index of" inurl:ftp after:2018

intitle:"index of" inurl:http after:2018


This dork will show you some results of site directories that are indexed in google by mistake, because the

"Parent Directory" & other critical directories should only be visible & accessible to site owners.

------------------------------------SHOW PRACTICAL EXAMPLE--------------------------------------------

allintext:password filetype:log after:2018

using this dork you can find out some log files, exposed to internet!


filetype:env "DB_PASSWORD" after:2018

The most interesting thing is you can also find vulnerabile website's configuration file.


filetype:xls inurl:"email.xls"

You can find email list using the above dork...


inurl:top.htm inurl:currenttime

Find vulnerable cameras

inurl:"lvappl.htm"


© 2020 BY ANUKIRAN GHOSH

  • Facebook Basic Black
  • Twitter Basic Black
  • Black Instagram Icon