Google Hacking – Using “Google Dorks”

This article is about Google hacking with the help of the dorks, I’m sure after reading this you will thank me for the particular info which I am going to provide you. The best part is you cannot be traced! Those who are new to the phase “Google Dorks” let me give you an introduction to Google search engine and Google dorks. Google is the most used search engine in this world because of it’s most efficient response. Google has some bots which crawl all over the net and copy almost all content available on databases to Google’s database. Therefore, it gives you the response when you type a word on Google search, it just checks its database and gives the response as you desire!

For making response more efficient Google has provided few functional words called dorks. Here is an example of how a dork looks like: “site:“. This particular is used for finding out the websites with a particular word in their domain name. Such as if you search in Google as  “site: uk” you will find the sites which belong to United Kingdom (U.K.) only! This makes your search response very accurate when you are searching something, especially related to a country.

Suppose you want to find some information regarding a site then you have the dork “site:example.com”. Just replace the example.com by the site whose information you need to know! And the most good thing is you can use several dorks at a time to make your result even more accurate.

You might be wondering why have I called this article as Google hacking when this a just a simple technique to make the Google response accurate. Actually you know the answer, I have told you in the starting itself…. Yes the Google bots I’m talking about! What happens here is the Google bots copy almost everything available on internet, that is they even copy sensitive information like usernames, passwords and credit cards numbers etc…

And other shocking thing is that you can also access unsecured webcams using Google dorks!

Isn’t that what you actually looking for?

So now you will definitely ask me how to get them?

The answer is dorks, we are going to use some best dorks available and extract the sensitive juicy info from the Google’s database.

Here are few examples of dorks with explanation which will help you finding some sensitive info:

Dorks for finding usernames and passwords:

auth_user_file.txt                                                       Gives you list of crackable passwords

“login: *” “password: *” filetype: xls                      Gives passwords file in saved in excel

filetype:log inurl:”password .log”                          Clear text password files

Dorks for finding Credit cards:

“ATM PIN” ReZult                                                        Credit card dumps by phishers

Dorks for MYSQL dumps:

?intitle:index.of?”.mysql_history                          Gets you the MySQL  history files

Input validation vulnerabilities:

intext:”Powered by X-Cart: shopping cart software” -site:x-cart.com

These were just simple dorks which will get you some juicy info, but there are thousands more which will give you access to very confidential data. If you don’t believe me then I must share a real life scenario, once I was trying out all the dorks which could be found on sites like exploit-db.com or hackersforcharity.org and trust me I got some restricted files of NASA where there were information regarding their transactions!

So go surf and find new dorks… And feel free to comment!

Advertisements

32 Comments

  1. Hi…friend i need your help,how to track the mobile by using IMEI Number? There is any software available for tracking mobile.

    Reply

  2. Do you mind if I quote a few of your posts as long as I provide credit and sources back to your weblog?
    My blog is in the exact same niche as yours and my visitors would truly benefit from some of
    the information you present here. Please let me know if this
    alright with you. Thank you!

    Reply

  3. Link exchange is nothing else but it is simply placing the other
    person’s blog link on your page at suitable place and other person will also do similar for you.

    Reply

  4. Having read this I believed it was really enlightening.
    I appreciate you taking the time and effort to put this short article together.
    I once again find myself spending way too much time both reading
    and posting comments. But so what, it was still worthwhile!

    Reply

  5. When I initially left a comment I seem to have clicked on the -Notify me when new comments are added- checkbox and from now on every time a comment is added I
    receive 4 emails with the exact same comment. Is there an easy method you can remove me from that service?
    Many thanks!

    Reply

  6. With havin so much content do you ever run into any problems of plagorism or copyright infringement?
    My website has a lot of unique content I’ve either authored myself or outsourced but it appears a lot of it is popping it up all
    over the internet without my agreement. Do you know
    any ways to help protect against content from being
    ripped off? I’d truly appreciate it.

    Reply

  7. Heya this is somewhat of off topic but I was wondering if blogs use WYSIWYG editors or if you
    have to manually code with HTML. I’m starting a
    blog soon but have no coding know-how so I wanted to get guidance from someone with experience.
    Any help would be greatly appreciated!

    Reply

  8. After I initially left a comment I seem to have clicked on the -Notify me when new comments are added-
    checkbox and from now on whenever a comment is added I recieve
    four emails with the exact same comment. Perhaps there is a way you can remove
    me from that service? Cheers!

    Reply

  9. This is the right blog for everyone who wishes to understand this topic.
    You realize a whole lot its almost tough
    to argue with you (not that I really will need to…HaHa).
    You definitely put a fresh spin on a subject that has been discussed for decades.
    Wonderful stuff, just great!

    Reply

  10. Ԍeneгally I do not read article on blogs, however I ᴡould like to ѕay that this write-up
    very forced mе to cheсk out and do it! Yօur writing taste has been amazed me.
    Thank you, very great articⅼe.

    Reply

  11. I believe that is among the so much significant
    info for me. And i am happy studying your article.
    However wanna remark on some basic things, The web site taste is ideal, the articles
    is really nice : D. Just right process, cheers

    Reply

  12. Hi there this is somewhat of off topic but I was wanting to know
    if blogs use WYSIWYG editors or if you have to manually code with HTML.
    I’m starting a blog soon but have no coding skills
    so I wanted to get guidance from someone with experience.
    Any help would be enormously appreciated!

    Reply

  13. Your style is very unique in comparison to other people I’ve read stuff from.

    I appreciate you for posting when you’ve got the opportunity, Guess
    I’ll just book mark this page.

    Reply

  14. It is not uncommon for exile politicians to mount an opposition from abroad, something blogs tend to make easier, so caution is suggested to the reason. It’s
    actually tougher to correct the injury inside the event that it has gone on very long.
    You has decided to recognize similar movement patterns for many currency pairs.

    Reply

  15. The typical duties of a release manager
    involve determining whether the module(s) making up
    a credit card applicatoin are perfectly tuned to meet with any possible requirements that people that use the application need.

    Most of the IT people who just graduated using course always bear
    within their minds on how to begin with another chapter using lives that is certainly to take
    procedures in making their careers at best. AA AThis happens because the industry
    of information technology is predominantly service based and
    if you are good at customer service as well as an in-depth knowledge on the subject, you may be
    greatly sought after and can enjoy lucrative opportunities as professionals.

    Reply

  16. And live inside arms of this fictitious Adonis whicch you have conjured as your fantasy mate.
    Thinnk “news”and make sure your site content resemble news articles with pictures
    and all. Over the coming months I’ll be writing
    a number of articles revealing the secrets tto publicity
    (everything a journalist really doesn’t would like you
    tto know.

    Reply

  17. This companies are not at all your run-of-the-millsupermarket,
    in fact it is really worth a try whether you determine to
    buy anything or not. Everyone could have their very own threshold, however for myself greater few times each
    hour is simply too much. They simply not hafe the resources to meet
    the customer’s needs in addition to their reputations are suffering ass being
    a result.

    Reply

Tell us what you think

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s