SlideShare une entreprise Scribd logo
1  sur  20
Google Dorks
Google hacking has never been so easy.
Andrea D’Ubaldo
@andreadubaldo
Google dorks
Summary
1.What is Google dorks
2.Queries syntax
3.Queries examples
4.Conclusion
What is Google Dorks ?
Let’s start with definition of “dorks”
1
“
A Google dork is an employee who
unknowingly exposes sensitive
corporate information on the Internet.
The word dork is slang for a slow-
witted or in-ept person.
Margaret Rouse
Director, WhatIs.com at TechTarget
@WhatIsDotCom
THE PURPOSE OF DORKS QUERIES
WHAT
Google dorks is a
powerful
advanced search,
an instrument to
perform queries
on Google search
engine.
HOW
That queries
allows the user to
find detailed
information over
the internet, such
files, hidden pages,
sensitive
documents and so
on.
WHY
But...dork queries
are considered by
many an “hacking
technique”.
Because of his
nature, the dorks
can be used for
different purposes,
often bad
purpose and we
shall then see...
Dorks queries
Queries syntax, special characters and operators.
2
SPECIAL CHARACTERS
Tilde [ ~ ]
Also research
synonyms of that
word
Star [ * ]
Substitution with
any other word in
the query
Minus [ - ]
Remove that word
from the research
OPERATORS
inurl
Find that word or
sentences in the
URL
inurl: php?id=
intitle
Find that word or
sentences in the
title of a website
intitle: search
related
Find that related
websites
related:www.google.
com
site
Restrict to a
specific site
site:fakesite.com
filetype
research by file
type
filetype:pdf
shakespeare
OTHER OPERATORS FROM WIKIPEDIA
Queries examples
This presentation is meant for educational purposes only
3
Google Hacking Database - Exploit Database
The Exploit Database is maintained by Offensive Security, an
information security training company that provides various
Information Security Certifications as well as high end
penetration testing services. Categories of dork queries by
GHDB :
● Footholds
● Files Containing
Usernames
● Sensitive Directories
● Web Server Detection
● Vulnerable Files
● Vulnerable Servers
● Error Messages
● Files Containing Juicy Info
● Files Containing Passwords
● Sensitive Online Shopping Info
● Network or Vulnerability Data
● Pages Containing Login Portals
● Various Online Devices
● Advisories and Vulnerabilities
Let’s see those underlined...
File containing passwords example
site:<somesite>.com intext:@gmail.com | @yahoo.com | @hotmail.com daterange:2457388-2457491
List of pastes ( username and password ) . Check your
email status on haveibeenpwned.com by Troy Hunt.
Pages containing login portal example
site:www.comune.*.*.* inurl:login
In this case, the star character have been changed with “.fc” and
“.it” domain in the first one, and “.tn” and “.it” for the second one.
comune means municipality, district.
Pages containing login portal example
site:www.comune.*.*.* inurl:login
With a simple query, we could find “any” website’s login page!
comune means municipality, district.
Vulnerable server example
Looking for SQL Injection point on the websites.
The following websites could be affected by this vulnerability !
inurl:index.php?id=
Sensitive directory example
The following folders probably contains sensitive data !
inurl:admin inurl:uploads
Conclusion4
Conclusion
Actually the best way to protect us against Google
hacking, is to test our website to figure out what could
harm us, then patch/fix/remove the problem if possible.
As we can see, it’s not difficult to find sensitive folders or
file over the network. Because of his simplicity, security
skills are not required to steal information.
Be careful and protect your data!
Thanks!
ANY QUESTIONS?
You can find me at
@andreadubaldo
andrea.dubaldo@protonmail.com
CREDITS AND REFERENCES
What is Google dork? – Margaret Rouse
What is Google dork? - WhatIs.com - TechTarget
whatis.techtarget.com
Google hacking
https://en.wikipedia.org/wiki/Google_hacking
Wikipedia.
Google Hacking Database (GHDB)
https://www.exploit-db.com/google-hacking-database/
Exploit Database
Special thanks to all the people who made and released these awesome
resources for free:
Presentation template by SlidesCarnival (http://www.slidescarnival.com/)
Photographs by Unsplash (http://unsplash.com/)

Contenu connexe

Tendances

Tendances (20)

ECMA Script
ECMA ScriptECMA Script
ECMA Script
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Dangerous google dorks
Dangerous google dorksDangerous google dorks
Dangerous google dorks
 
Deep web
Deep webDeep web
Deep web
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cse html ppt
Cse html pptCse html ppt
Cse html ppt
 
Secure Session Management
Secure Session ManagementSecure Session Management
Secure Session Management
 
Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptx
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
XXE
XXEXXE
XXE
 
OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)
 

En vedette

Social Networking Beyond Linked In
Social Networking Beyond Linked InSocial Networking Beyond Linked In
Social Networking Beyond Linked InRoger Pilney
 
Google hacking: Un conducto de Intrusion
Google hacking: Un conducto de IntrusionGoogle hacking: Un conducto de Intrusion
Google hacking: Un conducto de IntrusionHacking Bolivia
 
Introducción a las vulnerabilidades web
Introducción a las vulnerabilidades webIntroducción a las vulnerabilidades web
Introducción a las vulnerabilidades webPablo Garaizar
 
Using Facebook for Online Courses
Using Facebook for Online CoursesUsing Facebook for Online Courses
Using Facebook for Online CoursesBeth Gallaway
 
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidadesLa Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidadesPablo Garaizar
 
Rocks Science..232323232323232323
Rocks Science..232323232323232323Rocks Science..232323232323232323
Rocks Science..232323232323232323Benj Rombaoa
 
NrgEdge® Features
NrgEdge® FeaturesNrgEdge® Features
NrgEdge® FeaturesNrgEdge
 

En vedette (11)

Social Networking Beyond Linked In
Social Networking Beyond Linked InSocial Networking Beyond Linked In
Social Networking Beyond Linked In
 
Google hacking: Un conducto de Intrusion
Google hacking: Un conducto de IntrusionGoogle hacking: Un conducto de Intrusion
Google hacking: Un conducto de Intrusion
 
Google hacking
Google hackingGoogle hacking
Google hacking
 
Banner grabbing
Banner grabbingBanner grabbing
Banner grabbing
 
Introducción a las vulnerabilidades web
Introducción a las vulnerabilidades webIntroducción a las vulnerabilidades web
Introducción a las vulnerabilidades web
 
Using Facebook for Online Courses
Using Facebook for Online CoursesUsing Facebook for Online Courses
Using Facebook for Online Courses
 
Этичный хакинг
Этичный хакингЭтичный хакинг
Этичный хакинг
 
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidadesLa Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
La Web como plataforma de referencia: viejos ataques y nuevas vulnerabilidades
 
Rocks Science..232323232323232323
Rocks Science..232323232323232323Rocks Science..232323232323232323
Rocks Science..232323232323232323
 
Actividad significativa física e inglés
Actividad significativa física e inglésActividad significativa física e inglés
Actividad significativa física e inglés
 
NrgEdge® Features
NrgEdge® FeaturesNrgEdge® Features
NrgEdge® Features
 

Similaire à Google Dorks

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hackingsumit dimri
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Maximiliano Soler
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Demystifying google hacks
Demystifying google hacksDemystifying google hacks
Demystifying google hacksdarwinah retno
 
Research and describe a tool that can be used to test for web server.pdf
Research and describe a tool that can be used to test for web server.pdfResearch and describe a tool that can be used to test for web server.pdf
Research and describe a tool that can be used to test for web server.pdffathimafancyjeweller
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxPravash Chandra Das
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
 
Cloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit GiriCloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit GiriOWASP Delhi
 
(.Net Portfolio) Td Rodda
(.Net Portfolio) Td Rodda(.Net Portfolio) Td Rodda
(.Net Portfolio) Td Roddatdrodda
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilitiesOWASP
 
Advanced Search Engine Techniques
Advanced Search Engine TechniquesAdvanced Search Engine Techniques
Advanced Search Engine Techniquesshekhar619
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingSathishkumar A
 
Simple Tips to Secure your WordPress
Simple Tips to Secure your WordPressSimple Tips to Secure your WordPress
Simple Tips to Secure your WordPressFiroz Sabaliya
 

Similaire à Google Dorks (20)

Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
IDOR Know-How.pdf
IDOR Know-How.pdfIDOR Know-How.pdf
IDOR Know-How.pdf
 
Demystifying google hacks
Demystifying google hacksDemystifying google hacks
Demystifying google hacks
 
Research and describe a tool that can be used to test for web server.pdf
Research and describe a tool that can be used to test for web server.pdfResearch and describe a tool that can be used to test for web server.pdf
Research and describe a tool that can be used to test for web server.pdf
 
Tactical Information Gathering
Tactical Information GatheringTactical Information Gathering
Tactical Information Gathering
 
3 google hacking
3 google hacking3 google hacking
3 google hacking
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptx
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
 
Cloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit GiriCloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit Giri
 
(.Net Portfolio) Td Rodda
(.Net Portfolio) Td Rodda(.Net Portfolio) Td Rodda
(.Net Portfolio) Td Rodda
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
 
Advanced Search Engine Techniques
Advanced Search Engine TechniquesAdvanced Search Engine Techniques
Advanced Search Engine Techniques
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hacking
 
Simple Tips to Secure your WordPress
Simple Tips to Secure your WordPressSimple Tips to Secure your WordPress
Simple Tips to Secure your WordPress
 

Dernier

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 

Dernier (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 

Google Dorks

  • 1. Google Dorks Google hacking has never been so easy. Andrea D’Ubaldo @andreadubaldo
  • 2. Google dorks Summary 1.What is Google dorks 2.Queries syntax 3.Queries examples 4.Conclusion
  • 3. What is Google Dorks ? Let’s start with definition of “dorks” 1
  • 4. “ A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow- witted or in-ept person. Margaret Rouse Director, WhatIs.com at TechTarget @WhatIsDotCom
  • 5. THE PURPOSE OF DORKS QUERIES WHAT Google dorks is a powerful advanced search, an instrument to perform queries on Google search engine. HOW That queries allows the user to find detailed information over the internet, such files, hidden pages, sensitive documents and so on. WHY But...dork queries are considered by many an “hacking technique”. Because of his nature, the dorks can be used for different purposes, often bad purpose and we shall then see...
  • 6. Dorks queries Queries syntax, special characters and operators. 2
  • 7. SPECIAL CHARACTERS Tilde [ ~ ] Also research synonyms of that word Star [ * ] Substitution with any other word in the query Minus [ - ] Remove that word from the research
  • 8. OPERATORS inurl Find that word or sentences in the URL inurl: php?id= intitle Find that word or sentences in the title of a website intitle: search related Find that related websites related:www.google. com site Restrict to a specific site site:fakesite.com filetype research by file type filetype:pdf shakespeare
  • 10. Queries examples This presentation is meant for educational purposes only 3
  • 11. Google Hacking Database - Exploit Database The Exploit Database is maintained by Offensive Security, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. Categories of dork queries by GHDB : ● Footholds ● Files Containing Usernames ● Sensitive Directories ● Web Server Detection ● Vulnerable Files ● Vulnerable Servers ● Error Messages ● Files Containing Juicy Info ● Files Containing Passwords ● Sensitive Online Shopping Info ● Network or Vulnerability Data ● Pages Containing Login Portals ● Various Online Devices ● Advisories and Vulnerabilities Let’s see those underlined...
  • 12. File containing passwords example site:<somesite>.com intext:@gmail.com | @yahoo.com | @hotmail.com daterange:2457388-2457491 List of pastes ( username and password ) . Check your email status on haveibeenpwned.com by Troy Hunt.
  • 13. Pages containing login portal example site:www.comune.*.*.* inurl:login In this case, the star character have been changed with “.fc” and “.it” domain in the first one, and “.tn” and “.it” for the second one. comune means municipality, district.
  • 14. Pages containing login portal example site:www.comune.*.*.* inurl:login With a simple query, we could find “any” website’s login page! comune means municipality, district.
  • 15. Vulnerable server example Looking for SQL Injection point on the websites. The following websites could be affected by this vulnerability ! inurl:index.php?id=
  • 16. Sensitive directory example The following folders probably contains sensitive data ! inurl:admin inurl:uploads
  • 18. Conclusion Actually the best way to protect us against Google hacking, is to test our website to figure out what could harm us, then patch/fix/remove the problem if possible. As we can see, it’s not difficult to find sensitive folders or file over the network. Because of his simplicity, security skills are not required to steal information. Be careful and protect your data!
  • 19. Thanks! ANY QUESTIONS? You can find me at @andreadubaldo andrea.dubaldo@protonmail.com
  • 20. CREDITS AND REFERENCES What is Google dork? – Margaret Rouse What is Google dork? - WhatIs.com - TechTarget whatis.techtarget.com Google hacking https://en.wikipedia.org/wiki/Google_hacking Wikipedia. Google Hacking Database (GHDB) https://www.exploit-db.com/google-hacking-database/ Exploit Database Special thanks to all the people who made and released these awesome resources for free: Presentation template by SlidesCarnival (http://www.slidescarnival.com/) Photographs by Unsplash (http://unsplash.com/)