SlideShare a Scribd company logo
1 of 13
Google hacking &
optimizing search results
Faris Aloul
November 2011
Contents
 What is Google hacking?
 Basic operators
 Advanced operators
 Mixing different operators
What is Google hacking?
 It's not hacking into Google servers!
 Google hacking is using different Google
operators to effectively optimize search results.
 It also involves using Google to identify
vulnerabilities in websites.
 Results are highly customizable.
Basic operators
• For inclusion of something common (+)
Words that are commonly used, like 'the,' 'a,' and 'for,' are usually
ignored (these are called stop words).
• Terms you want to exclude (-)
Anti-virus -software
Georgia -america -state
• Search for an exact term (“)
“enter your text here”
Basic operators cont.
• ( * ) any word (wild card)
If you include * within a query, it tells Google to try to treat the star
as a placeholder for any unknown term(s) and then find the best
matches.
Estonia parliament voted on the * bill
• ( | ) boolean ‘OR’
I'll let you guess this one on your own.
Advanced operators
Advanced operators use a syntax such as the
following:
operator:search_term
• There’s no space between the operator, the
colon, and the search term!
Advanced operators
 Intitle:
Google returns results with the word/phrase found within the title
of the page
Intitle:index.of
 Inurl:
Finds a specific term within the URL
Inurl:view/index.shtml
Advanced operators
 Filetype:
Searches for a specific filetype
filetype:pdf
filetype:txt
The previous operators are the most commonly
used ones.
Mixing operators
Improvise!
 Inurl:securethiscompany.com intitle:index.of
 "mysql dump" Inurl: filetype:sql intext:password
 inurl:ftp "password" filetype:xls
 intitle:admin intitle:login
 Search for phpMyAdmin installations that are
configured to run the MySQL database with root
privileges:
intitle:phpMyAdmin “Welcome to phpMyAdmin
***” “running on * as root@*”
Johnny I hack stuff
 Most of this information was underground until
Johnny Long put it into public hands and
published the “google hacking database”
 Last year he changed his website and started
doing charity work.
The old GHDB (last update 2006)
 http://www.hackersforcharity.org/ghdb/
 The new and up-to-date GHDB
http://www.exploit-db.com/google-dorks/
Thank you!

More Related Content

Similar to FarisAloulSlides.ppt

The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
 
Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxPravash Chandra Das
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With GoogleZero Science Lab
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Maximiliano Soler
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
webclustering engine
webclustering enginewebclustering engine
webclustering engineDeepak Sharma
 
Google Advance Searching- Information System Audit & Control Report
Google Advance Searching- Information System Audit & Control ReportGoogle Advance Searching- Information System Audit & Control Report
Google Advance Searching- Information System Audit & Control ReportShahzeb Pirzada
 
Structured Document Search and Retrieval
Structured Document Search and RetrievalStructured Document Search and Retrieval
Structured Document Search and RetrievalOptum
 
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...Simplilearn
 
Google Hacking by Ali Jahangiri
Google Hacking by Ali JahangiriGoogle Hacking by Ali Jahangiri
Google Hacking by Ali JahangiriDevetol
 
Google search techniques
Google search techniquesGoogle search techniques
Google search techniquesNirav Ranpara
 
Google search techniques
Google search techniquesGoogle search techniques
Google search techniquesNirav Ranpara
 

Similar to FarisAloulSlides.ppt (20)

The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
 
google dork.pdf
google dork.pdfgoogle dork.pdf
google dork.pdf
 
Google power search
Google power searchGoogle power search
Google power search
 
Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptx
 
Google Searchology
Google SearchologyGoogle Searchology
Google Searchology
 
3 google hacking
3 google hacking3 google hacking
3 google hacking
 
Hacking
HackingHacking
Hacking
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
webclustering engine
webclustering enginewebclustering engine
webclustering engine
 
Google Advance Searching- Information System Audit & Control Report
Google Advance Searching- Information System Audit & Control ReportGoogle Advance Searching- Information System Audit & Control Report
Google Advance Searching- Information System Audit & Control Report
 
Search engine optimization panda-penguin-mobile
Search engine optimization panda-penguin-mobileSearch engine optimization panda-penguin-mobile
Search engine optimization panda-penguin-mobile
 
Structured Document Search and Retrieval
Structured Document Search and RetrievalStructured Document Search and Retrieval
Structured Document Search and Retrieval
 
Splunk bsides
Splunk bsidesSplunk bsides
Splunk bsides
 
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
Google Dorking Tutorial | What Is Google Dorks And How To Use It? | Ethical H...
 
Google Hacking by Ali Jahangiri
Google Hacking by Ali JahangiriGoogle Hacking by Ali Jahangiri
Google Hacking by Ali Jahangiri
 
Internet search techniques by zakir hossain
Internet search techniques by zakir hossainInternet search techniques by zakir hossain
Internet search techniques by zakir hossain
 
Google search techniques
Google search techniquesGoogle search techniques
Google search techniques
 
Google search techniques
Google search techniquesGoogle search techniques
Google search techniques
 

More from aashnareddy1

More from aashnareddy1 (6)

ppt mini.pptx
 ppt mini.pptx ppt mini.pptx
ppt mini.pptx
 
NANOROBOTICS1.ppt
NANOROBOTICS1.pptNANOROBOTICS1.ppt
NANOROBOTICS1.ppt
 
sa-mincut-aditya.ppt
sa-mincut-aditya.pptsa-mincut-aditya.ppt
sa-mincut-aditya.ppt
 
Ai chatbot ppt.pptx
Ai chatbot ppt.pptxAi chatbot ppt.pptx
Ai chatbot ppt.pptx
 
L2_Networks_OSI_TCP_IP.pptx
L2_Networks_OSI_TCP_IP.pptxL2_Networks_OSI_TCP_IP.pptx
L2_Networks_OSI_TCP_IP.pptx
 
MFI.pptx
MFI.pptxMFI.pptx
MFI.pptx
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

FarisAloulSlides.ppt

  • 1. Google hacking & optimizing search results Faris Aloul November 2011
  • 2. Contents  What is Google hacking?  Basic operators  Advanced operators  Mixing different operators
  • 3. What is Google hacking?  It's not hacking into Google servers!  Google hacking is using different Google operators to effectively optimize search results.  It also involves using Google to identify vulnerabilities in websites.  Results are highly customizable.
  • 4. Basic operators • For inclusion of something common (+) Words that are commonly used, like 'the,' 'a,' and 'for,' are usually ignored (these are called stop words). • Terms you want to exclude (-) Anti-virus -software Georgia -america -state • Search for an exact term (“) “enter your text here”
  • 5. Basic operators cont. • ( * ) any word (wild card) If you include * within a query, it tells Google to try to treat the star as a placeholder for any unknown term(s) and then find the best matches. Estonia parliament voted on the * bill • ( | ) boolean ‘OR’ I'll let you guess this one on your own.
  • 6. Advanced operators Advanced operators use a syntax such as the following: operator:search_term • There’s no space between the operator, the colon, and the search term!
  • 7. Advanced operators  Intitle: Google returns results with the word/phrase found within the title of the page Intitle:index.of  Inurl: Finds a specific term within the URL Inurl:view/index.shtml
  • 8. Advanced operators  Filetype: Searches for a specific filetype filetype:pdf filetype:txt The previous operators are the most commonly used ones.
  • 9. Mixing operators Improvise!  Inurl:securethiscompany.com intitle:index.of  "mysql dump" Inurl: filetype:sql intext:password  inurl:ftp "password" filetype:xls
  • 10.  intitle:admin intitle:login  Search for phpMyAdmin installations that are configured to run the MySQL database with root privileges: intitle:phpMyAdmin “Welcome to phpMyAdmin ***” “running on * as root@*”
  • 11. Johnny I hack stuff  Most of this information was underground until Johnny Long put it into public hands and published the “google hacking database”  Last year he changed his website and started doing charity work.
  • 12. The old GHDB (last update 2006)  http://www.hackersforcharity.org/ghdb/  The new and up-to-date GHDB http://www.exploit-db.com/google-dorks/