SlideShare a Scribd company logo
1 of 12
Download to read offline
Google Dorks
-Advance Searching Technique
Name: Mayurkumar Jagdishbhai Parmar
About
Experienced Security Researcher with a demonstrated history of
working in the information technology and Computer Forensics, Digital
Forensics. Studying M.sc in Digital Forensics & Information Security
focused in Digital Forensics & information security from Gujarat
Forensic Sciences University, Gandhinagar.
Hackerone:
https://hackerone.com/th3cyb3rc0p
OpenBugBounty:
https://www.openbugbounty.org/researchers/th3cyb3rc0p/
Bugcrowd:
https://bugcrowd.com/th3cyb3rc0p
Linkdn:
https://www.linkedin.com/in/mayur-parmar-38b30616b/
Google Dorks?
➢ Google Dorks is Generally a Search Engine That is a Google.
➢ In our Daily life we want some information of particular topic that we will goto the
google & type the topic that we want to get that info.
➢ But in Google Dork it uses Search String that uses Advance Operators to find the
information that are not easily Visible to the public.
Uses of Google Dorks:-
➢ It is Used to find the Vulnerabilities in the website.
➢ Hidden information of the website.
o Like Username & password,Email list,Some sensitive Data,such As bank account
details,Transaction details etc.
➢ It is also Useful to Ethical Hacker to perform some of the task.Such As networking
mapping,Information Gathering,Port Scanning.
Google Operators:-
• Basic Operators:
o +,-,~,.,*,”, | ,OR
• Advance Operators:
o Allintext:,allintitle:,allinurl:,cache:,define:,filetype:,info:,intext:,intitle
:,inurl:,link:,phonebook:,related:,site:,numrange:
Syntax to find Information:
➢ To find the Entertainment retaled files:
o -inurl:(htm|html|php) intitle:"index of" +"last modified"
+"parent directory" +description +size +(extension)
"Song name"
▪ Extension can be .mp3,.wma,.ogg
▪ Song name is the name of the song that u want
o Example:
-In this Example we can find the Music files.
➢ To find a particular Book:-
o -inurl:(htm|html|php) intitle:"index of" +"last modified"
+"parent directory" +description +size +(extension)
"Book name"
▪ Extension can be .pdf,.rtf,.txt,.chm,.pps,.rar,.doc etc.
Example:
-In this Example we can find the particular book.
For Searching the Modified Password List:
o intitle:"Index of" passwords modified
Example:
-In this Example It shows the modified Password List.
• For searching the files the developer made an Software
Called Google Hacks.In this Software user will not have
to remember all the Syntax.
• For Installation Of Google Hacks Software Follow Below
Steps:
o Step1: Download The Software Package from:
▪ https://sourceforge.net/projects/googlehacks/fil
es/googlehacks/Google%20Hacks%201.6/
o Step2:
▪ Click on the Setup.
-Click on I Agree
Step3:Click on Next
Step4:Choose the path that you want to install & click on next
Step5:Click on Install.
Step6:Installation is done.
-Main Interface of Google Hacks Software:
-It is an tool which allows you to search any of the information in
the google/any search engine.
-You can find
Music,Book,Video,Tools,Hacks,Proxy,Lyrics,Fonts,Application,Tor
rent,Cache,Web Hosting.
-And this software is Free you don’t have to pay extra fees for this.
Thank You
Hope this information give
you a brief idea about Google
Dorks.

More Related Content

Similar to Google Dorks -Advance Searching Technique

Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxPravash Chandra Das
 
Simran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcingSimran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcingIIIT Hyderabad
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internettkisason
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepatNie Andini
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
Advanced Search Engine Techniques
Advanced Search Engine TechniquesAdvanced Search Engine Techniques
Advanced Search Engine Techniquesshekhar619
 
00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdf00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdfeanyang7
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools Roundtable2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools RoundtableSusanna Frazier
 
Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018timohund
 
The Web Application Hackers Toolchain
The Web Application Hackers ToolchainThe Web Application Hackers Toolchain
The Web Application Hackers Toolchainjasonhaddix
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)softwaresatish
 
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...Demi Ben-Ari
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Alan Quayle
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
 

Similar to Google Dorks -Advance Searching Technique (20)

Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptx
 
Simran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcingSimran confidentiality protection in crowdsourcing
Simran confidentiality protection in crowdsourcing
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internet
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepat
 
Google Searchology
Google SearchologyGoogle Searchology
Google Searchology
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Advanced Search Engine Techniques
Advanced Search Engine TechniquesAdvanced Search Engine Techniques
Advanced Search Engine Techniques
 
00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdf00_pytorch_and_deep_learning_fundamentals.pdf
00_pytorch_and_deep_learning_fundamentals.pdf
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools Roundtable2019 Fall SourceCon Sourcing Tools Roundtable
2019 Fall SourceCon Sourcing Tools Roundtable
 
Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018Apache Solr for TYPO3 what's new 2018
Apache Solr for TYPO3 what's new 2018
 
The Web Application Hackers Toolchain
The Web Application Hackers ToolchainThe Web Application Hackers Toolchain
The Web Application Hackers Toolchain
 
Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
 
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
 
Searching tech2
Searching tech2Searching tech2
Searching tech2
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Google Dorks -Advance Searching Technique

  • 1. Google Dorks -Advance Searching Technique Name: Mayurkumar Jagdishbhai Parmar About Experienced Security Researcher with a demonstrated history of working in the information technology and Computer Forensics, Digital Forensics. Studying M.sc in Digital Forensics & Information Security focused in Digital Forensics & information security from Gujarat Forensic Sciences University, Gandhinagar. Hackerone: https://hackerone.com/th3cyb3rc0p OpenBugBounty: https://www.openbugbounty.org/researchers/th3cyb3rc0p/ Bugcrowd: https://bugcrowd.com/th3cyb3rc0p Linkdn: https://www.linkedin.com/in/mayur-parmar-38b30616b/
  • 2. Google Dorks? ➢ Google Dorks is Generally a Search Engine That is a Google. ➢ In our Daily life we want some information of particular topic that we will goto the google & type the topic that we want to get that info. ➢ But in Google Dork it uses Search String that uses Advance Operators to find the information that are not easily Visible to the public. Uses of Google Dorks:- ➢ It is Used to find the Vulnerabilities in the website. ➢ Hidden information of the website. o Like Username & password,Email list,Some sensitive Data,such As bank account details,Transaction details etc. ➢ It is also Useful to Ethical Hacker to perform some of the task.Such As networking mapping,Information Gathering,Port Scanning. Google Operators:- • Basic Operators: o +,-,~,.,*,”, | ,OR • Advance Operators: o Allintext:,allintitle:,allinurl:,cache:,define:,filetype:,info:,intext:,intitle :,inurl:,link:,phonebook:,related:,site:,numrange: Syntax to find Information: ➢ To find the Entertainment retaled files: o -inurl:(htm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(extension) "Song name" ▪ Extension can be .mp3,.wma,.ogg ▪ Song name is the name of the song that u want
  • 4. -In this Example we can find the Music files. ➢ To find a particular Book:- o -inurl:(htm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(extension) "Book name" ▪ Extension can be .pdf,.rtf,.txt,.chm,.pps,.rar,.doc etc. Example:
  • 5. -In this Example we can find the particular book. For Searching the Modified Password List: o intitle:"Index of" passwords modified Example:
  • 6. -In this Example It shows the modified Password List.
  • 7. • For searching the files the developer made an Software Called Google Hacks.In this Software user will not have to remember all the Syntax. • For Installation Of Google Hacks Software Follow Below Steps: o Step1: Download The Software Package from: ▪ https://sourceforge.net/projects/googlehacks/fil es/googlehacks/Google%20Hacks%201.6/ o Step2: ▪ Click on the Setup. -Click on I Agree
  • 8. Step3:Click on Next Step4:Choose the path that you want to install & click on next
  • 10. -Main Interface of Google Hacks Software:
  • 11. -It is an tool which allows you to search any of the information in the google/any search engine. -You can find Music,Book,Video,Tools,Hacks,Proxy,Lyrics,Fonts,Application,Tor rent,Cache,Web Hosting. -And this software is Free you don’t have to pay extra fees for this.
  • 12. Thank You Hope this information give you a brief idea about Google Dorks.