SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Google Dorks
-Advance Searching Technique
Name: Mayurkumar Jagdishbhai Parmar
About
Experienced Security Researcher with a demonstrated history of
working in the information technology and Computer Forensics, Digital
Forensics. Studying M.sc in Digital Forensics & Information Security
focused in Digital Forensics & information security from Gujarat
Forensic Sciences University, Gandhinagar.
Hackerone:
https://hackerone.com/th3cyb3rc0p
OpenBugBounty:
https://www.openbugbounty.org/researchers/th3cyb3rc0p/
Bugcrowd:
https://bugcrowd.com/th3cyb3rc0p
Linkdn:
https://www.linkedin.com/in/mayur-parmar-38b30616b/
Google Dorks?
➢ Google Dorks is Generally a Search Engine That is a Google.
➢ In our Daily life we want some information of particular topic that we will goto the
google & type the topic that we want to get that info.
➢ But in Google Dork it uses Search String that uses Advance Operators to find the
information that are not easily Visible to the public.
Uses of Google Dorks:-
➢ It is Used to find the Vulnerabilities in the website.
➢ Hidden information of the website.
o Like Username & password,Email list,Some sensitive Data,such As bank account
details,Transaction details etc.
➢ It is also Useful to Ethical Hacker to perform some of the task.Such As networking
mapping,Information Gathering,Port Scanning.
Google Operators:-
• Basic Operators:
o +,-,~,.,*,”, | ,OR
• Advance Operators:
o Allintext:,allintitle:,allinurl:,cache:,define:,filetype:,info:,intext:,intitle
:,inurl:,link:,phonebook:,related:,site:,numrange:
Syntax to find Information:
➢ To find the Entertainment retaled files:
o -inurl:(htm|html|php) intitle:"index of" +"last modified"
+"parent directory" +description +size +(extension)
"Song name"
▪ Extension can be .mp3,.wma,.ogg
▪ Song name is the name of the song that u want
o Example:
-In this Example we can find the Music files.
➢ To find a particular Book:-
o -inurl:(htm|html|php) intitle:"index of" +"last modified"
+"parent directory" +description +size +(extension)
"Book name"
▪ Extension can be .pdf,.rtf,.txt,.chm,.pps,.rar,.doc etc.
Example:
-In this Example we can find the particular book.
For Searching the Modified Password List:
o intitle:"Index of" passwords modified
Example:
-In this Example It shows the modified Password List.
• For searching the files the developer made an Software
Called Google Hacks.In this Software user will not have
to remember all the Syntax.
• For Installation Of Google Hacks Software Follow Below
Steps:
o Step1: Download The Software Package from:
▪ https://sourceforge.net/projects/googlehacks/fil
es/googlehacks/Google%20Hacks%201.6/
o Step2:
▪ Click on the Setup.
-Click on I Agree
Step3:Click on Next
Step4:Choose the path that you want to install & click on next
Step5:Click on Install.
Step6:Installation is done.
-Main Interface of Google Hacks Software:
-It is an tool which allows you to search any of the information in
the google/any search engine.
-You can find
Music,Book,Video,Tools,Hacks,Proxy,Lyrics,Fonts,Application,Tor
rent,Cache,Web Hosting.
-And this software is Free you don’t have to pay extra fees for this.
Thank You
Hope this information give
you a brief idea about Google
Dorks.

Weitere ähnliche Inhalte

Ähnlich wie Google Dorks -Advance Searching Technique

Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxPravash Chandra Das
 
Simran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcingSimran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcingIIIT Hyderabad
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internettkisason
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepatNie Andini
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
Advanced Search Engine Techniques
Advanced Search Engine TechniquesAdvanced Search Engine Techniques
Advanced Search Engine Techniquesshekhar619
 
00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdf00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdfeanyang7
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools Roundtable2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools RoundtableSusanna Frazier
 
Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018timohund
 
The Web Application Hackers Toolchain
The Web Application Hackers ToolchainThe Web Application Hackers Toolchain
The Web Application Hackers Toolchainjasonhaddix
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)softwaresatish
 
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...Demi Ben-Ari
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Alan Quayle
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
 

Ähnlich wie Google Dorks -Advance Searching Technique (20)

Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptx
 
Simran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcingSimran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcing
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internet
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepat
 
Google Searchology
Google SearchologyGoogle Searchology
Google Searchology
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Advanced Search Engine Techniques
Advanced Search Engine TechniquesAdvanced Search Engine Techniques
Advanced Search Engine Techniques
 
00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdf00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdf
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools Roundtable2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools Roundtable
 
Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018
 
The Web Application Hackers Toolchain
The Web Application Hackers ToolchainThe Web Application Hackers Toolchain
The Web Application Hackers Toolchain
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
 
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
 
Searching tech2
Searching tech2Searching tech2
Searching tech2
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Google Dorks -Advance Searching Technique

  • 1. Google Dorks -Advance Searching Technique Name: Mayurkumar Jagdishbhai Parmar About Experienced Security Researcher with a demonstrated history of working in the information technology and Computer Forensics, Digital Forensics. Studying M.sc in Digital Forensics & Information Security focused in Digital Forensics & information security from Gujarat Forensic Sciences University, Gandhinagar. Hackerone: https://hackerone.com/th3cyb3rc0p OpenBugBounty: https://www.openbugbounty.org/researchers/th3cyb3rc0p/ Bugcrowd: https://bugcrowd.com/th3cyb3rc0p Linkdn: https://www.linkedin.com/in/mayur-parmar-38b30616b/
  • 2. Google Dorks? ➢ Google Dorks is Generally a Search Engine That is a Google. ➢ In our Daily life we want some information of particular topic that we will goto the google & type the topic that we want to get that info. ➢ But in Google Dork it uses Search String that uses Advance Operators to find the information that are not easily Visible to the public. Uses of Google Dorks:- ➢ It is Used to find the Vulnerabilities in the website. ➢ Hidden information of the website. o Like Username & password,Email list,Some sensitive Data,such As bank account details,Transaction details etc. ➢ It is also Useful to Ethical Hacker to perform some of the task.Such As networking mapping,Information Gathering,Port Scanning. Google Operators:- • Basic Operators: o +,-,~,.,*,”, | ,OR • Advance Operators: o Allintext:,allintitle:,allinurl:,cache:,define:,filetype:,info:,intext:,intitle :,inurl:,link:,phonebook:,related:,site:,numrange: Syntax to find Information: ➢ To find the Entertainment retaled files: o -inurl:(htm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(extension) "Song name" ▪ Extension can be .mp3,.wma,.ogg ▪ Song name is the name of the song that u want
  • 4. -In this Example we can find the Music files. ➢ To find a particular Book:- o -inurl:(htm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(extension) "Book name" ▪ Extension can be .pdf,.rtf,.txt,.chm,.pps,.rar,.doc etc. Example:
  • 5. -In this Example we can find the particular book. For Searching the Modified Password List: o intitle:"Index of" passwords modified Example:
  • 6. -In this Example It shows the modified Password List.
  • 7. • For searching the files the developer made an Software Called Google Hacks.In this Software user will not have to remember all the Syntax. • For Installation Of Google Hacks Software Follow Below Steps: o Step1: Download The Software Package from: ▪ https://sourceforge.net/projects/googlehacks/fil es/googlehacks/Google%20Hacks%201.6/ o Step2: ▪ Click on the Setup. -Click on I Agree
  • 8. Step3:Click on Next Step4:Choose the path that you want to install & click on next
  • 10. -Main Interface of Google Hacks Software:
  • 11. -It is an tool which allows you to search any of the information in the google/any search engine. -You can find Music,Book,Video,Tools,Hacks,Proxy,Lyrics,Fonts,Application,Tor rent,Cache,Web Hosting. -And this software is Free you don’t have to pay extra fees for this.
  • 12. Thank You Hope this information give you a brief idea about Google Dorks.