<aside> <img src="/icons/fireworks_gray.svg" alt="/icons/fireworks_gray.svg" width="40px" />

Goal - Identification & Verification

What are google dorks?

Specific queries to manipulate Google directives for identifying misconfiguration and potential vulnerabilities on Internet accessible hosts.

Examples:

Dork Usage Explanation
intext intext:"login page” Finds pages containing specific text within the body of the webpage.
intitle intitle:"index of” Searches for pages with specific text in their title. Useful for finding specific types of pages or directories.
inurl inurl:"admin” Searches for specific text within the URL of webpages. Great for narrowing down admin panels or specific paths.
filetype filetype:pdf "confidential” Finds files of a specific type (e.g., PDF, DOCX, XLSX) containing specified keywords.
cache cache:example.com Shows Google’s cached version of a webpage. Useful for viewing content that may have changed or been removed.
ext ext:txt "passwords” Similar to filetype, it searches for files of a specific extension.
site site:example.com "admin” Restricts the search to a specific site or domain. Handy for focused searches on a particular website.
allintitle allintitle:"report 2024 confidential” Searches for pages where all specified words appear in the title. A broader version of intitle.

References

https://www.exploit-db.com/google-hacking-database