Google dorks
29.12.2023
17
0
0
0
Certain search queries are structured in such a way to find information on sites or on the Internet. Often, the information is confidential. And it is not supposed to be wide open.
The first person to start collecting such hacks was Johnny Long. He collected those requests that revealed site vulnerabilities and could possibly be useful for further pentesting. It was the harsh year of 2002. And since then, a huge database of such hacks has been collected. All of them can be found at
https://www.exploit-db.com/google-hacking-database.
I will also collect my table of operators and how they interact with each other here.
Operator | Purpose |
---|---|
intitle | Search by page title |
allintitle | Search by page title |
inurl | Search by URL |
allinurl | Search by URL |
filetype | Search only specific file type |
intext | Search only page text |
allintext | Search page text only |
site | Search a specific site |
link | Search page links |
inanchor | Search by anchor text |
numrange | Find a number |
daterange | Search a date range |
author | Search group authors |
group | Search by group name |
insubject | Search by group topic |
msgid | Search by group msgid |