How to Use Google Dorks Commands List (Part-1)
Google uses about 80 percent of all online search queries, proving it to be the most popular search engine. However, Google makes it possible to not only access information that is publicly available but also provide access to some of the most confidential information that should not be disclosed. In this post, you will find details about how Google is used to exploit security threats on many websites. The following are some ways to use Google to Dork
The idea of using Google as a hacking tool is certainly not new, and hackers have been using this amazingly popular search engine for years. Google Dorks took root in 2002 when a man named Johnny Long started using custom queries to look for features of certain websites that he could use in an attack. At its core, this is what Google Dorks is – a search engine optimization tool for targeting websites with specific errors, risks, and sensitive information that can be gained. As a separate note, some people refer to Google Dorks as Google Hacking (they are more or less the same name).
What is Google Dork?
It is a search engine that uses advanced search queries to find information that is not readily available on websites. It is also considered an illegal google scam that criminals often use for purposes such as cyber terrorism and online theft.
How to use Google dorks
Google will highlight the words within the archive. For example, the web [cache: www.google.com] will display content stored in the archive with the word “web” highlighted. This functionality is also accessible by clicking the “Cached” link on the main Google results page. The query [archive:] will show the version of the web page Google has in its archive.
Also Read: Create & Host Your Own Dark Web Onion Website on Termux
Captcha Issue while using Google Dork
As we may use google to do work, it may disclose the information of others, and such information may be used for malicious purposes. Many black hat hackers put bots online to crawl websites, find vulnerabilities on pages, and send data back to servers. To stop and degrade this issue, Google has introduced a captcha in this process. You will need to enter a captcha almost every time you use a dork. In this way, Google stops bots from using google for illegal purposes.
What data can we get using google dorks?
- Username and passwords
- Admin login pages
- Sensitive documents
- Government/military data
- Email lists
- 𝐵𝒶𝓃𝓀 𝒶𝒸𝒸𝑜𝓊𝓃𝓉 details
- Vulnerable websites
- So much more …
Also Read: Hide Secret Message On Hacked by Hacker
Can Hackers use Google Dork?
People often view Google as a search engine that is used to find text, images, videos, and stories. In the infosec world, however, it plays a very important role. Google can also be used as a very useful hacking tool.
You cannot hack websites directly using Google. However, the great power of web crawling can be very helpful in identifying almost anything between any website that includes sensitive information. This can include the username, password, and other common risks you will never know.
Basically, using Google Dorking you can detect the dangers of any web applications and servers with the help of the native Google Search engine.
Special google search operators :
Before you start with google dorks, you need a basic understanding of a few google search operators and how they work.
- intitle – This allows a hacker to search for pages with specific text in their HTML title. So intitle – “login page” will help a hacker scour the web for login pages.
- allintitle – Similar to the previous operator, but only returns results for pages that meet all of the keyword criteria.
- inurl – This allows a hacker to search for pages based on the text in the URL (i.e., “login.php”).
- allinurl – Similar to the previous operator, but only returns matches for URLs that meet all the matching criteria.
- filetype – Helps a hacker narrow down search results to specific files such as PHP, PDF, or TXT file types.
- ext – Very similar to filetype, but this looks for files based on their file extension.
- intext – This operator searches the entire content of a given page for keywords supplied by the hacker.
- allintext – Similar to the previous operator but requires a page to match all of the given keywords.
- site – Limits the scope of a query to a single website.
- cache – text ……
1, Intitle command
A title is a command used when we want to filter documents based on HTML page headings. As we know that HTML pages have those keywords in the title that define the whole document. They represent a summary of what is described in this text. We can use this feature to get what we want. Suppose we need documents that contain information related to IP-Camera and then write a question to tell google which filters all pages based on the given issue.
We also have the option of using more keywords to get more accurate results. Using multiple keywords, we write them in separate commas. Google finds all the pages first, then applies the filters to the results. Those web pages that do not have keywords in the website title are discarded. The syntax for applying this command is as follows:
allintitle:”ip camera” “dvr”
Below is the result of this question. You can see that it has shown us all those pages that have both of these keywords in their title. We can use this process to filter our results more effectively.
2. inurl & allinurl command
The Inurl command works in the same way as the intitle. The difference is that Inurl is a command used when we want to filter documents based on URL text, as we know that HTML pages have those keywords in the URL that define the entire document. They represent a summary of what is described in this text. We can use this feature to get what we want. Also, suppose we are looking for documents that contain information related to IP-Camera. We’ll write a question to let google filter all pages based on the given issue. We also have the option of using more keywords to get more accurate results. The basic syntax for using this command is as follows:
3. Filetype command
Filetype is one of the seven most popular Google Dork sites as it helps to filter large files. It can filter pdf files for you. It can also filter your log files. Log files are very useful for collecting organization-related information as these are files that track all the events that take place in an organization. If we want to access simple log files, we can write this command: filetype: log, and it will give us all kinds of log files, but this will not be very helpful until again if we try to reduce our search by. other filters.
Let’s make it very clear that we want those files with usernames and passwords. To this end, we will address our question as follows:
It will show those results with the usernames and passwords cited in it. If these files do not belong to any server, one cannot imagine how much damage they can cause.
You can use this process to minimize the effects on a particular user.
First, you will find log files using this query, and then you can easily find the required username after searching in that text.
4. ext command
Sometimes, we want to search for documents of some kind. For example, we want to write an article about “detection of identity theft.” We cannot begin to write about it without first researching it. Research articles are widely published in pdf formats. Now, if we want to read the previous research done on this topic, we will add another dork to our order, called ext. Ext is a command used to specify file extensions. It works as a file-type command. If we fix our previous search, which we did about Ford cars, we may now want to look at only pdf files, and then write the question as follows: Google Dork
From the results below, you can see that we now only have pdf files as our results.
5. Intext & allintext Command
The text command is used to find specific text within the search result on a web page. Text can be used in two ways. The first is to find one keyword in the results and the second way to find more keywords in the search. To accomplish the initial task, the command syntax says
To accomplish the second task, we use allintext instead of text. We also classify keywords using a single space. If we use allintext, google will add all of those resulting pages to all the keywords in the text specified in the query. If a webpage contains missing keywords, it will be discarded in the results, and the user will not be able to see that webpage. That is why these instructions are used with the appropriate keywords so that the required information is not discarded.
As you can see, every return page has a username and password, and that’s because of our query, which we used. He gave us those pages with both keywords. Google Dork
6. Site command
We have another very useful command if we want to search for a particular business. Initially, we expand our search process and gather the information that may or may not be relevant to our needs. After finding enough first place, we begin to narrow down our search using some commands. For example, suppose we wanted to buy a car, and we were searching for cars that were later introduced in 2020. After getting a list of results, we scanned the pages and found that Honda and Ford are reliable. Now our next step will be to gather information about these vehicles on authentic websites. So here comes the use of site command. Now, we will limit our search to certain websites only.
It will provide us with everything related to this website only. Similarly, if we want to search now, we can only change the website address and get our results.
7. Cache Command
Google not only writes current versions of web pages, but also keeps previous versions of websites in its archive, and those pages can sometimes provide you with more information about the technology used by developers. It may also occasionally disclose information that was originally used for testing purposes only and has been removed from recent versions but still appears in changes that Google has in its archive.
Its syntax says “cache: website address”. For example, let’s use a random website cache command and see the results. Results may vary from time to time as we see updates from google again.
Regarding the results, we have a number of responses that can collect additional information related to that website. We may also use this search query to highlight keywords in our search results. Suppose we want to highlight the word “flex” in our research, and then write the question as follows.
Also Read: MobSF – Mobile Apps Pentesting & Malware Analysis Framework
i want to start hacking please teach me