Skip to main content

Google hacking techniques which many don't know, lets learn 👍💪😲🙌

 How many of know google hacking??


Yes, A search engine google helps in hacking.


Google Hacking or google dorking is a search hacking technique that uses advanced queries to find the information. google dorks refer to specific search commands which is written in URL to find the information. A dork comprises of combination of parameter and search operators that are written in search bar. ethical hackers use this advanced search to find the crucial information.


With the help of google dorking, any information hidden on public websites and vulnerabilities and sensitive information of any website is exposed. savvy criminals and security analysts also use  dorking for finding the information. osint and security professionals use the whole database and find the vulnerabilities.


The Google Hacking Database (GHDB) was initially started by Johnny Long. but is now maintained and updated at Exploit Database. The Google Hacking Database (GHDB) is  categorized index of Internet search engine queries designed to uncover information.


Here is a list of few  google dorks


define - Returns a definition of the given term-  eg : define photosynthesis

time - Returns the current time at a particular location- eg : time Germany

translate - Translates the queried terms into another specified language- eg : translate hello world Spanish

map - Returns map result- eg : map Kolkata

weather - Returns the weather forecast for the given location or ZIP code- eg: weather Delhi


Basic Search Symbols


- Excludes search results that include this term. best tablets -drawing


| Returns search results that match terms on either side of the pipe. The same as writing "OR" between search terms- eg : computer | tablet


@ Returns search results that match a particular social media site- eg: phone recall @facebook


# Returns search results that include a specific hashtag- eg : #throwbackthursday


“” Returns search results that include all terms within quotes in the exact given order-  eg : “never gonna give you up”


* Returns search results where any words can be matched in place of the asterisk- eg : best * in india


() Used to group search terms and control the search logic of the query- eg : (best | worst) samsung


$ Returns prices. mac $1000


cache: Show Google's cached version of a specific page-  cache:google.com


filetype: Returns only search results that match a particular file extension-  physics study material filetype:pdf


site: Returns only search results from a particular website. productivity tips

 

intext: Returns only search results that match in the page's body.


allintext: Same as intext, but matching every term that appears after allintext.


intitle: Returns only search results that match in page's title.


allintitle: Same as intitle, but matching every term that appears after allintitle.


inurl: Returns only search results that match in the page's URL.


allinurl: Same as inurl, but matching every term that appears after allinurl.



these are few dorks which I know, please let me know more dorks in  comment section below

Comments

Popular posts from this blog

WHAT IS HTTP ?? HOW HTTP WORKS?

What is HTTP? HTTP is a protocol. HTTP stands for Hypertext standard protocol . It is defined as a set of rules used for communicating with servers while transmitting any message from client to server. then, what is HTTPS? HTTPS is a secure version of HTTP. "s" is Secure in HTTPS. In HTTPS the data sent is encrypted, so that people don't see the message transmitted over the network. By using the secured version the data sent or received is completely encrypted and no one can impersonate it. When we access a website, our browser sends requests to the server and then the server gives the response in the form of web pages. webpages consist of images, audio, video, html files, and more. How do we access a website? When we access a website, the browser sends a request to a web server and downloads the responses. You need to tell the browser specifically from where to access the resources, this is where the URLs help. URL is a uniform Resource Locator which gives instructio...

What is TCP/IP Model??

What is TCP/IP Model?? TCP stands for Transmission Control protocol/Internet Protocol . It is a communication protocol used to interconnect the devices in the internet. Initially, the Transmission Control Program provided only a common service to its users, not datagram. As experience with the protocol grew, functionality was divided into layers of distinct protocols, allowing users direct access to service.  TCP provides reliable, ordered delivery of  bytes between applications running on hosts communicating via network. TCP is connection oriented means a connection is established between a client and server before data is sent. The server waits for the connection requests from clients before any connection is formed.  TCP/IP has 5 layers  Application Layer : This layer allows the user to interact with the application.  Transport Layer : This layer is responsible for flow control, the data is sent through this layer. Network Layer : This layer is responsible f...

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it . Social engineering is a term we are hearing now a days a  lot. But  what is it?  Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions. Lets see few techniques with examples below Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person. Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number. Vishing also known as " voice phishing ", is again the same practice of revealing the information over a ...