Google Hacking – Using “Google Dorks”

This article is about Google hacking with the help of the dorks, I’m sure after reading this you will thank me for the particular info which I am going to provide you. The best part is you cannot be traced! Those who are new to the phase “Google Dorks” let me give you an introduction to Google search engine and Google dorks. Google is the most used search engine in this world because of it’s most efficient response. Google has some bots which crawl all over the net and copy almost all content available on databases to Google’s database. Therefore, it gives you the response when you type a word on Google search, it just checks its database and gives the response as you desire!

For making response more efficient Google has provided few functional words called dorks. Here is an example of how a dork looks like: “site:“. This particular is used for finding out the websites with a particular word in their domain name. Such as if you search in Google as  “site: uk” you will find the sites which belong to United Kingdom (U.K.) only! This makes your search response very accurate when you are searching something, especially related to a country.

Suppose you want to find some information regarding a site then you have the dork “site:example.com”. Just replace the example.com by the site whose information you need to know! And the most good thing is you can use several dorks at a time to make your result even more accurate.

You might be wondering why have I called this article as Google hacking when this a just a simple technique to make the Google response accurate. Actually you know the answer, I have told you in the starting itself…. Yes the Google bots I’m talking about! What happens here is the Google bots copy almost everything available on internet, that is they even copy sensitive information like usernames, passwords and credit cards numbers etc…

And other shocking thing is that you can also access unsecured webcams using Google dorks!

Isn’t that what you actually looking for?

So now you will definitely ask me how to get them?

The answer is dorks, we are going to use some best dorks available and extract the sensitive juicy info from the Google’s database.

Here are few examples of dorks with explanation which will help you finding some sensitive info:

Dorks for finding usernames and passwords:

auth_user_file.txt                                                       Gives you list of crackable passwords

“login: *” “password: *” filetype: xls                      Gives passwords file in saved in excel

filetype:log inurl:”password .log”                          Clear text password files

Dorks for finding Credit cards:

“ATM PIN” ReZult                                                        Credit card dumps by phishers

Dorks for MYSQL dumps:

?intitle:index.of?”.mysql_history                          Gets you the MySQL  history files

Input validation vulnerabilities:

intext:”Powered by X-Cart: shopping cart software” -site:x-cart.com

These were just simple dorks which will get you some juicy info, but there are thousands more which will give you access to very confidential data. If you don’t believe me then I must share a real life scenario, once I was trying out all the dorks which could be found on sites like exploit-db.com or hackersforcharity.org and trust me I got some restricted files of NASA where there were information regarding their transactions!

So go surf and find new dorks… And feel free to comment!

Advertisements

18 Comments

  1. Hi…friend i need your help,how to track the mobile by using IMEI Number? There is any software available for tracking mobile.

    Reply

  2. Do you mind if I quote a few of your posts as long as I provide credit and sources back to your weblog?
    My blog is in the exact same niche as yours and my visitors would truly benefit from some of
    the information you present here. Please let me know if this
    alright with you. Thank you!

    Reply

  3. Link exchange is nothing else but it is simply placing the other
    person’s blog link on your page at suitable place and other person will also do similar for you.

    Reply

  4. Having read this I believed it was really enlightening.
    I appreciate you taking the time and effort to put this short article together.
    I once again find myself spending way too much time both reading
    and posting comments. But so what, it was still worthwhile!

    Reply

  5. When I initially left a comment I seem to have clicked on the -Notify me when new comments are added- checkbox and from now on every time a comment is added I
    receive 4 emails with the exact same comment. Is there an easy method you can remove me from that service?
    Many thanks!

    Reply

  6. With havin so much content do you ever run into any problems of plagorism or copyright infringement?
    My website has a lot of unique content I’ve either authored myself or outsourced but it appears a lot of it is popping it up all
    over the internet without my agreement. Do you know
    any ways to help protect against content from being
    ripped off? I’d truly appreciate it.

    Reply

  7. Heya this is somewhat of off topic but I was wondering if blogs use WYSIWYG editors or if you
    have to manually code with HTML. I’m starting a
    blog soon but have no coding know-how so I wanted to get guidance from someone with experience.
    Any help would be greatly appreciated!

    Reply

  8. After I initially left a comment I seem to have clicked on the -Notify me when new comments are added-
    checkbox and from now on whenever a comment is added I recieve
    four emails with the exact same comment. Perhaps there is a way you can remove
    me from that service? Cheers!

    Reply

  9. This is the right blog for everyone who wishes to understand this topic.
    You realize a whole lot its almost tough
    to argue with you (not that I really will need to…HaHa).
    You definitely put a fresh spin on a subject that has been discussed for decades.
    Wonderful stuff, just great!

    Reply

Tell us what you think

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s