Google Dork: go further in the search

Disclamer In this article, we are not going to make you a hacker, the goal is rather to control the hidden information that anyone could see by typing some targeted queries in Google. This way they can discover information leaks, vulnerabilities in your website.

What is Google Dork?

A Google Dork query, sometimes called simply dork, is a search string that uses advanced search operators to find information that is not readily available on a website.

In other words, we can use Google Dorks to discover hidden information buried on websites. Since Google has a search algorithm and indexes most websites, it can be useful for a hacker to find vulnerabilities on a target.

The basic syntax for advanced operators in Google is as follows:

operator_name:keyword

For example, this syntax operator_name:keyword can be typed as filetype:xls intext:username in the standard search field, which results in a list of Excel files containing the term “Username”.

Simple syntax of Google Dorks

Site function: allows you to search for a specific website only. Example: site:mondom.com housing (the keyword housing is searched on the pages of the indicated domain)

Allintitle” and “intitle” function: the title of the page contains the specified search term. Allintitle for an exact search. Example: allintitle:housing 

inurl” function: limits the results to those where the specified search keyword is contained in the URLs. Example: inurl:housing 

filetype” function: search for a specified file type. Example: filetype:pdf, also works with office documents such as (doc, docx, xls, xls, ppt, pptx). Example: filetype:pdf housing

intext” function: search for a site with a text containing the keyword or query

Other functions that are more related to the field of referencing

inanchor” function, but related, info and link functions are obsolete

Additional tips, remember to use inverted commas when you have several keywords, and the – to remove words that would interfere with your search. Example: filetype:pdf “housing in Versailles” -Paris

Finding sub-domain names

We are able to find the sub-domain of a target site using a simple Dork. We use the “site” function with -www, example: site:mondom.com -www

What data can we find using Google Dorks?

  • Administrator login pages
  • User names and passwords
  • Confidential documents
  • Government/military data
  • Email lists, phone
  • Bank account details

There are over 6500 orders in this page https://www.exploit-db.com/google-hacking-database