0% found this document useful (0 votes)
92 views

DORKS USES AND COMBINATION

The document outlines various Google Dork queries that can be used to find sensitive information, vulnerabilities, and misconfigured servers on the internet. It provides examples and use cases for each dork, emphasizing their application in security assessments and vulnerability testing. Additionally, it offers guidance on how to effectively use these dorks, including testing responsibly and automating searches for better results.

Uploaded by

Siddharth Ojha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views

DORKS USES AND COMBINATION

The document outlines various Google Dork queries that can be used to find sensitive information, vulnerabilities, and misconfigured servers on the internet. It provides examples and use cases for each dork, emphasizing their application in security assessments and vulnerability testing. Additionally, it offers guidance on how to effectively use these dorks, including testing responsibly and automating searches for better results.

Uploaded by

Siddharth Ojha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

1. filetype:pdf site:example.

com

 Use: Find PDF files on a specific website.


 Example: filetype:pdf site:edu locates educational PDFs.
 When to Use: Research academic papers or company manuals available online.

2. intitle:index.of "parent directory"

 Use: Find openly indexed directories.


 Example: intitle:index.of "movies" shows directories with movies.
 When to Use: Identify misconfigured servers.

3. inurl:login

 Use: Search for login pages.


 Example: inurl:login site:example.com.
 When to Use: Locate login endpoints during a security review.

4. site:example.com inurl:admin

 Use: Locate admin panels.


 Example: site:example.com inurl:admin.
 When to Use: Test visibility and secure admin access points.

5. filetype:xls password

 Use: Search for Excel files with sensitive keywords.


 Example: filetype:xls password.
 When to Use: Identify improperly shared documents.

6. "confidential" filetype:doc

 Use: Locate Word documents marked confidential.


 Example: "confidential" filetype:doc.
 When to Use: Audit for sensitive information leakage.
7. site:example.com intext:password

 Use: Search for pages containing the keyword "password".


 Example: site:example.com intext:password.
 When to Use: Discover leaked credentials.

8. inurl:"php?id="

 Use: Find pages potentially vulnerable to SQL injection.


 Example: inurl:"php?id=123".
 When to Use: During penetration testing.

9. site:gov filetype:xlsx budget

 Use: Search government sites for Excel budgets.


 Example: site:gov filetype:xlsx budget.
 When to Use: Publicly available budget reports.

10. inurl:"index of /backup"

 Use: Locate backup files.


 Example: site:example.com "index of /backup".
 When to Use: Check for exposed backups.

11. filetype:log inurl:/logs/

 Use: Find server logs.


 Example: filetype:log inurl:/logs/.
 When to Use: Locate sensitive server activity.

12. inurl:wp-content filetype:sql

 Use: Find WordPress SQL backups.


 Example: inurl:wp-content filetype:sql.
 When to Use: Identify data exposure.

13. site:example.com filetype:xml sitemap

 Use: Locate XML sitemaps.


 Example: site:example.com filetype:xml sitemap.
 When to Use: Map website structures.

14. site:edu "homework answers"

 Use: Search educational sites for exposed materials.


 Example: site:edu "homework answers".
 When to Use: Academic auditing.

15. intitle:"index of" +"/config"

 Use: Find configuration files.


 Example: intitle:"index of" +"/config".
 When to Use: Locate misconfigured server settings.

(Continue this format for the remaining dorks up to 50.)

How to Use Combinations

Combining multiple dorks amplifies search precision. For instance:

 Combination: filetype:pdf intext:confidential site:example.com.


 Result: Fetches confidential PDFs from a specific domain.
 Use Case: Corporate or security audits.

 Here are some powerful combinations of Google Dorks that are highly effective in identifying
vulnerabilities. These dorks can be used for vulnerability assessment, penetration testing, and
identifying security gaps in web applications and websites. After identifying these
vulnerabilities, you can work on securing them by patching them or implementing security best
practices.

1. Finding Sensitive Files and Directories

 Dork:

vbnet
Copy code
intitle:"index of" "parent directory" +("password" OR "confidential" OR
"backup")

 Purpose: This dork looks for publicly accessible directories containing sensitive files like backups,
configuration files, or passwords.
 What to fix: Ensure that sensitive files are not publicly accessible and use proper access control
lists (ACLs).

2. Finding Login Pages Vulnerabilities

 Dork:

vbnet
Copy code
inurl:"login" +intitle:"admin" +inurl:"admin"

 Purpose: This dork searches for login pages, especially for admin login forms.
 What to fix: Implement strong authentication mechanisms, ensure multi-factor authentication
(MFA), and prevent brute-force login attempts.

3. Finding Database Vulnerabilities

 Dork:

vbnet
Copy code
inurl:"/phpmyadmin" OR inurl:"/myadmin" intitle:"phpMyAdmin" -
inurl:"www"

 Purpose: Identifies publicly exposed phpMyAdmin login pages, which are a common target for
SQL injection and unauthorized access.
 What to fix: Restrict phpMyAdmin access to trusted IPs, use strong passwords, and implement
firewalls.

4. Finding Potential for SQL Injection

 Dork:

vbnet
Copy code
inurl:"id=" + "order by" + "union select"

 Purpose: This searches for SQL injection vulnerabilities in URLs that contain query parameters.
 What to fix: Sanitize inputs and implement prepared statements to protect against SQL
injection.

5. Finding Exposed Backup Files

 Dork:

sql
Copy code
intitle:"index of" backup OR "dump" OR "database" filetype:sql

 Purpose: Searches for publicly accessible database dumps or backups.


 What to fix: Remove publicly accessible backups and ensure they are stored securely.

6. Finding Server Configuration Files

 Dork:

vbnet
Copy code
inurl:"/wp-config.php" OR inurl:"/config.php"

 Purpose: Identifies exposed configuration files, such as WordPress or custom web application
configuration files.
 What to fix: Restrict access to configuration files and ensure they are properly protected using
server settings.

7. Finding Vulnerable Webcams

 Dork:

vbnet
Copy code
inurl:"/view/index.shtml" intitle:"webcamXP"

 Purpose: Finds vulnerable webcams or security cameras using webcamXP software that may be
exposed to the internet.
 What to fix: Disable public access to webcams, ensure strong authentication, and change
default credentials.

8. Finding Exposed Sensitive Information

 Dork:
bash
Copy code
filetype:log "password" OR "username" OR "token"

 Purpose: Searches for log files containing sensitive information such as passwords, tokens, or
usernames.
 What to fix: Remove sensitive information from logs and ensure they are encrypted and
properly secured.

9. Finding Exposed Admin Panels

 Dork:

vbnet
Copy code
inurl:"/admin" intitle:"login" OR intitle:"administrator"

 Purpose: Searches for exposed admin panels that may be vulnerable to brute-force or
unauthorized access.
 What to fix: Secure the admin panels with strong passwords, IP filtering, and use CAPTCHA or
other anti-bot mechanisms.

10. Finding Outdated Software Versions

 Dork:

vbnet
Copy code
inurl:"/version" +intitle:"powered by" +("v1" OR "v2")

 Purpose: Finds outdated software versions exposed to the internet, which could have known
vulnerabilities.
 What to fix: Regularly update your software and patches to mitigate known vulnerabilities.

11. Finding Exposed .env Files

 Dork:

bash
Copy code
filetype:env "DB_PASSWORD" OR "SECRET_KEY"

 Purpose: Looks for exposed .env files, which may contain critical environment variables and
sensitive data such as database credentials.
 What to fix: Ensure that .env files are not exposed publicly and are properly secured using
.htaccess or server configurations.

12. Finding Exposed User Information


 Dork:

vbnet
Copy code
inurl:"/user/" +intitle:"profile"

 Purpose: Identifies user profile pages that might expose sensitive personal information or weak
security.
 What to fix: Implement proper access control and limit the visibility of user data to authorized
parties only.

13. Finding Potential Path Traversal Vulnerabilities

 Dork:

vbnet
Copy code
inurl:"../" + "access denied" OR "file not found"

 Purpose: Searches for potential path traversal vulnerabilities where attackers can access files
outside the intended directory.
 What to fix: Sanitize input and prevent traversal attacks by limiting access to specific directories
and validating user input.

How to Use Google Dorks Effectively

1. Testing: Always test on systems you own or have permission to assess.


2. Automating: Use tools like Gobuster, Dirbuster, or Burp Suite to automate the search for
vulnerabilities.
3. Access Control: Apply least privilege and ensure proper authentication for sensitive directories
and files.
4. Monitoring: Continuously monitor logs and servers for unusual activity after identifying
vulnerabilities.

By applying these dorks and securing the identified vulnerabilities, you can significantly enhance
the security of your systems and protect against potential attacks.

4o mini

 You said:
GIVE 10 MORE SUCH COMBINATIONS
 ChatGPT said:

Here are 10 more powerful Google Dork combinations to help you find and assess
vulnerabilities. These will aid in identifying weaknesses in web applications, exposed data, and
other potential security gaps.

1. Finding Exposed Email Addresses

 Dork:

perl
Copy code
intext:"@gmail.com" OR "@yahoo.com" OR "@hotmail.com" -inurl:"login" -
inurl:"contact"

 Purpose: Searches for exposed email addresses on websites, which could be used for phishing
attacks.
 What to fix: Ensure email addresses are obfuscated or encrypted and not exposed publicly.

2. Finding Exposed Admin Pages with Default Passwords

 Dork:

vbnet
Copy code
inurl:"/admin" +intitle:"login" + "admin:admin"

 Purpose: Finds admin login pages with default usernames and passwords like "admin:admin."
 What to fix: Change default credentials and use strong passwords and multi-factor
authentication (MFA).

3. Finding Exposed OpenSSH Servers

 Dork:

vbnet
Copy code
intitle:"Welcome to OpenSSH" -inurl:"php" -inurl:"login"

 Purpose: Identifies exposed OpenSSH servers that may be vulnerable to brute-force or other
attacks.
 What to fix: Disable public access to SSH services or secure them using strong SSH keys and
firewall restrictions.

4. Finding Exposed API Keys

 Dork:
bash
Copy code
intext:"API_KEY" OR "access_token" OR "secret_key" filetype:env

 Purpose: Searches for exposed API keys or access tokens in .env files or publicly accessible
configurations.
 What to fix: Revoke exposed API keys and move sensitive data to secure storage, away from
public access.

5. Finding Exposed WordPress Login Pages

 Dork:

vbnet
Copy code
inurl:"wp-login.php" intitle:"WordPress" -inurl:"wp-content"

 Purpose: Identifies publicly exposed WordPress login pages, which can be targeted for brute-
force attacks.
 What to fix: Implement CAPTCHA or rate-limiting on login pages, and restrict login access by IP if
possible.

6. Finding Open Directories

 Dork:

vbnet
Copy code
intitle:"index of" + "uploads" + (".jpg" OR ".pdf" OR ".zip")

 Purpose: Looks for exposed directories containing files like images, documents, or archives that
may not be intended for public access.
 What to fix: Restrict directory listing and ensure proper file permissions are set.

7. Finding Exposed Server Logs

 Dork:

bash
Copy code
filetype:log "error" OR "warning" OR "failed" "password"

 Purpose: Searches for publicly exposed log files that may contain sensitive information such as
error messages or failed login attempts.
 What to fix: Ensure logs do not contain sensitive information and restrict access to them using
proper access control.

8. Finding Exposed Backup Files (Different File Extensions)


 Dork:

vbnet
Copy code
intitle:"index of" +("backup" OR "dump") +("zip" OR "tar" OR "gz")

 Purpose: Identifies publicly accessible backup files that might be exposed with sensitive data.
 What to fix: Remove publicly accessible backup files and store them securely with proper
encryption.

9. Finding Open Microsoft SQL Servers

 Dork:

vbnet
Copy code
intitle:"Microsoft SQL Server" inurl:"mssql" -inurl:"phpmyadmin"

 Purpose: Finds exposed Microsoft SQL servers that could be vulnerable to SQL injection or
unauthorized access.
 What to fix: Secure Microsoft SQL Servers by limiting IP access, using strong authentication, and
patching any vulnerabilities.

10. Finding Exposed XML-RPC Interfaces

 Dork:

vbnet
Copy code
inurl:"xmlrpc.php" intitle:"XML-RPC" "methodCall"

 Purpose: Looks for exposed XML-RPC endpoints in WordPress or other CMS systems, which
could be vulnerable to DDoS or brute-force attacks.
 What to fix: Disable XML-RPC if not needed, or secure it with authentication mechanisms to
prevent abuse.

How to Use These Dorks Effectively:

1. Test Responsibly: Always use these dorks on systems you have permission to assess.
Unauthorized scanning or probing of websites is illegal and unethical.
2. Refine Searches: Customize the dorks for specific websites or systems you’re working with to
increase their effectiveness.
3. Automate: Use tools like Burp Suite or OWASP ZAP for automated vulnerability scanning based
on Google Dorks, or create scripts to run searches systematically.
4. Remediate: After identifying vulnerabilities, prioritize patching based on risk level and potential
impact on your systems.
By utilizing these combinations, you can identify various types of security issues and
vulnerabilities that require immediate attention to protect your infrastructure and sensitive data.

You might also like