SlideShare a Scribd company logo
August 21,2014 
Kaushal Kishore [ kaushal@osscube.com ] 
Lead Engineer OSSCube 
Google Dorks 
(Google Hacking)
Quick Survey
2 
Quick Survey 
• How many people have heard of Google Dorks before this Meet 
up ? 
• How many people have tried Google Dorks? 
• How many people are using Google Dorks for hacking purpose ?
Google Dorks 
• “Using public sources openly and without 
resorting to illegal means, it is possible to 
gather at least 80 percent of all information 
required about the enemy” - Al Qaeda 
training manual
What is Google Dorks and Google Hacking 
?
What is Google Hacking 
• It's not hacking into Google servers! 
• Google hacking is using different Google operators to 
effectively optimize search results. 
• It also involves using Google to identify vulnerabilities 
in websites. 
• Results are highly customizable. All Web site content is 
exposed to Google 
• Sensitive content might be available for months before 
the compromise is discovered 
• Even after sensitive pages are removed, they will be 
stored in Google Cache
Google Hacking 
• Google hacking is a term that refers to the art 
of creating complex search engine queries in 
order to filter through large amounts of search 
results for information related to computer 
security.
How it Works ? 
• Google Search indexes everything that is 
made public including “virtual notebooks” and 
the information stored within that notebook 
in their search results. 
• Google is one of the most powerful databases 
in the world
Information disclosure with Google 
• Private information 
• Remote Admin Interface 
• Configuration management 
• Error messages 
• Backup files 
• Public vulnerabilities 
• Technology Profile
How Google Works 
?
How Google Works
Google Operators 
“Operators are used to refine the 
results and to maximize the 
search value. They are your tools 
as well as hackers’ weapons”
Google Operators 
• Basic Operators 
 +, -, ~ , ., *, “”, |, OR 
• Advanced Operators 
 allintext:, allintitle:, allinurl:, bphonebook:, 
cache:, define:, filetype:, info:, intext:, intitle:, 
inurl:, link:, phonebook:, related:, rphonebook:, 
site:, numrange:, daterange
Basic Operators 
• (+) force inclusion of something common 
– Google ignores common words (where, how, digit, single letters) by default: 
– Example: StarStarWars Episode +I 
• (-) exclude a search term 
– Example: apple –red 
• (“) use quotes around a search term to search exact phrases: 
– Example: “Robert Masse” 
– Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. 
Reduce the 99% irrelevant results 
• (~) search synonym: 
– Example: ~food 
– Return the results about food as well as recipe, nutrition and cooking information 
• ( . ) a single-character wildcard: 
– Example: m.trix 
– Return the results of M@trix, matrix, metrix……. 
• ( * ) any word wildcard
Advance Operators “Site” 
• Advance Operator : “Site” 
– Find Web pages only on the specified domain. If 
we search a specific site, usually we get the Web 
structure of the domain 
– Examples: 
• site:com 
• site:osscube.ca 
• site:www.osscube.ca
Advance Operators “Filetype” 
• Advanced Operators: “Filetype:” 
– Filetype: extension_type 
– Find documents with specified extensions 
– Example 
• filetype:pdf 
• filetype:xls 
• Site:osscube.com filetype:pdf 
• Site:osscube.com filetype:txt 
• Budget filetype: xls
Advance Operators “Intitle” 
• Advanced Operators “Intitle:” 
– Intitle: search_term 
– Find search term within the title of a Webpage 
– Allintitle: search_term1 search_term2 search_term3 
– Find multiple search terms in the Web pages with the 
title that includes all these words 
– These operators are specifically useful to find the 
directory lists 
– Example: 
• Find directory list: 
• Intitle: Index.of “parent directory”
Advance Operators “Inurl” 
• Advanced Operators “Inurl:” 
– Inurl: search_term 
– Find search term in a Web address 
– Allinurl: search_term1 search_term2 
search_term3 
– Find multiple search terms in a Web address 
– Examples: 
• Inurl: cgi-bin 
• Allinurl: cgi-bin password
Advance Operators “Intext” 
• Advanced Operators “Intext;” 
– Intext: search_term 
– Find search term in the text body of a document. 
– Allintext: search_term1 search_term2 
search_term3 
– Find multiple search terms in the text body of a 
document. 
– Examples: 
• Intext: Administrator login 
• Allintext: Administrator login
Advance Operators “Cache” 
• Advanced Operators: “Cache:” 
– Cache: URL 
– Find the old version of Website in Google cache 
– Sometimes, even the site has already been 
updated, the old information might be found in 
cache 
– Examples: 
• Cache: www.osscube.com
Advance Operators “<number1>..<number2>” 
• Advanced Operators 
– <number1>..<number2> 
– Conduct a number range search by specifying two 
numbers, separated by two periods, with no 
spaces. Be sure to specify a unit of measure or 
some other indicator of what the number range 
represents 
– Examples: 
• Computer $500..1000 
• DVD player $250..350
Advance Operators “Link” 
• Advanced Operators “Link:” 
– Link: URL 
• Find the Web pages having a link to the specified URL 
– Related: URL 
• Find the Web pages that are “similar” to the specified Web page 
– info: URL 
• Present some information that Google has about that Web page 
– Define: search_term 
• Provide a definition of the words gathered from various online sources 
– Examples: 
• Link: osscube.com 
• Related: osscube.com 
• Info: osscube.com 
• Define: Network security
References 
• http://www.googleguide.com/advanced_oper 
ators_reference.html 
• http://www.google.com/advanced_search 
• http://www.google.com/help/operators.html 
• http://www.exploit-db.com/google-dorks/ 
• http://www.hackersforcharity.org/ghdb/
Google “Friend or Enemy” 
• Google is everyone’s best friend (yours or 
hackers) 
• Information gathering and vulnerability 
identification are the tasks in the first phase 
of a typical hacking scenario 
• Passitive, stealth and huge data collection 
• Google can do more than search 
• Have you used Google to audit your 
organization today?
Questions ?
Thank you! 
Email : kaushal@osscube.com

More Related Content

What's hot

Social engineering
Social engineering Social engineering
Social engineering
VÎùàý Pãtêl
 
Introduction to google hacking database
Introduction to google hacking databaseIntroduction to google hacking database
Introduction to google hacking database
imthebeginner
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
Sameera Amjad
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
Osama Ellahi
 
Footprinting
FootprintingFootprinting
Footprinting
Duah John
 
Darknet
DarknetDarknet
Darknet
Shubham Dwivedi
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
Christian Martorella
 
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
Deepak Kumar (D3)
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
Adityakumar Yadav
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
Jisc
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
CHETAN THAKRE
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
Hossein Yavari
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 2016
 

What's hot (20)

Social engineering
Social engineering Social engineering
Social engineering
 
Introduction to google hacking database
Introduction to google hacking databaseIntroduction to google hacking database
Introduction to google hacking database
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Footprinting
FootprintingFootprinting
Footprinting
 
Darknet
DarknetDarknet
Darknet
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
Deep web
Deep webDeep web
Deep web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 

Viewers also liked

ComposiciĂłn bĂĄsica de dorks
ComposiciĂłn bĂĄsica de dorksComposiciĂłn bĂĄsica de dorks
ComposiciĂłn bĂĄsica de dorks
Tensor
 
Documents About [Credit Card]
Documents About [Credit Card]Documents About [Credit Card]
Documents About [Credit Card]abaraham mores
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
k4yl4hamilton
 
Havij dork
Havij dorkHavij dork
Havij dorkiyusrusnadi
 
Google dorks
Google dorksGoogle dorks
Google dorks
Govind Rajput
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Rob Ragan
 
Docker Presentation
Docker PresentationDocker Presentation
Docker Presentation
Adhoura Academy
 
Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...
Kofax
 
Google as a Hacking Tool
Google as a Hacking ToolGoogle as a Hacking Tool
Google as a Hacking ToolConferencias FIST
 
Google hacking 2015
Google hacking 2015Google hacking 2015
Google hacking 2015
gopartheredbuff
 
Introduction Php
Introduction PhpIntroduction Php
Introduction Php
sanjay joshi
 
Developing Your Ultimate Package
Developing Your Ultimate PackageDeveloping Your Ultimate Package
Developing Your Ultimate Package
Simon Collison
 
いちばん簡単なconcrete5テーマ
いちばん簡単なconcrete5テーマいちばん簡単なconcrete5テーマ
いちばん簡単なconcrete5テーマ
Hideki MACHIDA
 
Technote Index Map Help
Technote Index Map HelpTechnote Index Map Help
Technote Index Map Helpguest0e7fb2
 

Viewers also liked (19)

ComposiciĂłn bĂĄsica de dorks
ComposiciĂłn bĂĄsica de dorksComposiciĂłn bĂĄsica de dorks
ComposiciĂłn bĂĄsica de dorks
 
Documents About [Credit Card]
Documents About [Credit Card]Documents About [Credit Card]
Documents About [Credit Card]
 
Php
PhpPhp
Php
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
Havij dork
Havij dorkHavij dork
Havij dork
 
Google dorks
Google dorksGoogle dorks
Google dorks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
 
Docker Presentation
Docker PresentationDocker Presentation
Docker Presentation
 
Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...
 
Dr.Repi
Dr.Repi Dr.Repi
Dr.Repi
 
Google as a Hacking Tool
Google as a Hacking ToolGoogle as a Hacking Tool
Google as a Hacking Tool
 
Google hacking 2015
Google hacking 2015Google hacking 2015
Google hacking 2015
 
Introduction Php
Introduction PhpIntroduction Php
Introduction Php
 
Developing Your Ultimate Package
Developing Your Ultimate PackageDeveloping Your Ultimate Package
Developing Your Ultimate Package
 
C lipagem tarumĂŁ maio 2010
C lipagem tarumĂŁ   maio 2010C lipagem tarumĂŁ   maio 2010
C lipagem tarumĂŁ maio 2010
 
いちばん簡単なconcrete5テーマ
いちばん簡単なconcrete5テーマいちばん簡単なconcrete5テーマ
いちばん簡単なconcrete5テーマ
 
Xdebug confoo11
Xdebug confoo11Xdebug confoo11
Xdebug confoo11
 
Technote Index Map Help
Technote Index Map HelpTechnote Index Map Help
Technote Index Map Help
 

Similar to Google Dorks

3 google hacking
3 google hacking3 google hacking
3 google hacking
Syahmi Afiq Nizam
 
Google and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine HackingGoogle and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine Hacking
amirrullohacmad
 
Share point 2013 enterprise search (public)
Share point 2013 enterprise search (public)Share point 2013 enterprise search (public)
Share point 2013 enterprise search (public)Petter Skodvin-Hvammen
 
Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptx
Pravash Chandra Das
 
Searching the internet - what patent searchers should know
Searching the internet - what patent searchers should knowSearching the internet - what patent searchers should know
Searching the internet - what patent searchers should knowEric Sieverts
 
Scaling Recommendations, Semantic Search, & Data Analytics with solr
Scaling Recommendations, Semantic Search, & Data Analytics with solrScaling Recommendations, Semantic Search, & Data Analytics with solr
Scaling Recommendations, Semantic Search, & Data Analytics with solr
Trey Grainger
 
ki
kiki
kimartin
 
Google Hacking Basic
Google Hacking BasicGoogle Hacking Basic
Google Hacking BasicOcim Nationalism
 
Web search engines and search technology
Web search engines and search technologyWeb search engines and search technology
Web search engines and search technologyStefanos Anastasiadis
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
Elasticsearch speed is key
Elasticsearch speed is keyElasticsearch speed is key
Elasticsearch speed is key
Enterprise Search Warsaw Meetup
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
Sais Abdelkrim
 
Search engine ppt
Search engine pptSearch engine ppt
Search engine ppt
Sarvesh Meena
 
Scalability andefficiencypres
Scalability andefficiencypresScalability andefficiencypres
Scalability andefficiencypresNekoGato
 
SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014
SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014
SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014ALTER WAY
 
Searching the internet - what patent searchers should know
Searching the internet - what patent searchers should knowSearching the internet - what patent searchers should know
Searching the internet - what patent searchers should know
Eric Sieverts
 
searchengineppt-171025105119 (1).docx
searchengineppt-171025105119 (1).docxsearchengineppt-171025105119 (1).docx
searchengineppt-171025105119 (1).docx
NiteshRaj48
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
tieleman
 

Similar to Google Dorks (20)

3 google hacking
3 google hacking3 google hacking
3 google hacking
 
Google and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine HackingGoogle and Beyond: Advanced Search Engine Hacking
Google and Beyond: Advanced Search Engine Hacking
 
Share point 2013 enterprise search (public)
Share point 2013 enterprise search (public)Share point 2013 enterprise search (public)
Share point 2013 enterprise search (public)
 
Exploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptxExploring Google Dorks for Ethical Hacking.pptx
Exploring Google Dorks for Ethical Hacking.pptx
 
Searching the internet - what patent searchers should know
Searching the internet - what patent searchers should knowSearching the internet - what patent searchers should know
Searching the internet - what patent searchers should know
 
Scaling Recommendations, Semantic Search, & Data Analytics with solr
Scaling Recommendations, Semantic Search, & Data Analytics with solrScaling Recommendations, Semantic Search, & Data Analytics with solr
Scaling Recommendations, Semantic Search, & Data Analytics with solr
 
ki
kiki
ki
 
Google Hacking Basic
Google Hacking BasicGoogle Hacking Basic
Google Hacking Basic
 
Web search engines and search technology
Web search engines and search technologyWeb search engines and search technology
Web search engines and search technology
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Elasticsearch speed is key
Elasticsearch speed is keyElasticsearch speed is key
Elasticsearch speed is key
 
DC presentation 1
DC presentation 1DC presentation 1
DC presentation 1
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
Search engine ppt
Search engine pptSearch engine ppt
Search engine ppt
 
Scalability andefficiencypres
Scalability andefficiencypresScalability andefficiencypres
Scalability andefficiencypres
 
SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014
SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014
SĂŠminaire Big Data Alter Way - Elasticsearch - octobre 2014
 
Searching the internet - what patent searchers should know
Searching the internet - what patent searchers should knowSearching the internet - what patent searchers should know
Searching the internet - what patent searchers should know
 
searchengineppt-171025105119 (1).docx
searchengineppt-171025105119 (1).docxsearchengineppt-171025105119 (1).docx
searchengineppt-171025105119 (1).docx
 
Splunk bsides
Splunk bsidesSplunk bsides
Splunk bsides
 
Lessons learned while building Omroep.nl
Lessons learned while building Omroep.nlLessons learned while building Omroep.nl
Lessons learned while building Omroep.nl
 

More from Adhoura Academy

SQL Injection
SQL Injection SQL Injection
SQL Injection
Adhoura Academy
 
Drupal Content Management System
Drupal Content Management SystemDrupal Content Management System
Drupal Content Management System
Adhoura Academy
 
Content management system
Content management systemContent management system
Content management system
Adhoura Academy
 
Java script final presentation
Java script final presentationJava script final presentation
Java script final presentationAdhoura Academy
 
Android Presentation
Android PresentationAndroid Presentation
Android PresentationAdhoura Academy
 
Open Source Presentation
Open Source PresentationOpen Source Presentation
Open Source Presentation
Adhoura Academy
 

More from Adhoura Academy (6)

SQL Injection
SQL Injection SQL Injection
SQL Injection
 
Drupal Content Management System
Drupal Content Management SystemDrupal Content Management System
Drupal Content Management System
 
Content management system
Content management systemContent management system
Content management system
 
Java script final presentation
Java script final presentationJava script final presentation
Java script final presentation
 
Android Presentation
Android PresentationAndroid Presentation
Android Presentation
 
Open Source Presentation
Open Source PresentationOpen Source Presentation
Open Source Presentation
 

Recently uploaded

A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 

Recently uploaded (20)

A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 

Google Dorks

  • 1. August 21,2014 Kaushal Kishore [ kaushal@osscube.com ] Lead Engineer OSSCube Google Dorks (Google Hacking)
  • 3. 2 Quick Survey • How many people have heard of Google Dorks before this Meet up ? • How many people have tried Google Dorks? • How many people are using Google Dorks for hacking purpose ?
  • 4. Google Dorks • “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80 percent of all information required about the enemy” - Al Qaeda training manual
  • 5. What is Google Dorks and Google Hacking ?
  • 6. What is Google Hacking • It's not hacking into Google servers! • Google hacking is using different Google operators to effectively optimize search results. • It also involves using Google to identify vulnerabilities in websites. • Results are highly customizable. All Web site content is exposed to Google • Sensitive content might be available for months before the compromise is discovered • Even after sensitive pages are removed, they will be stored in Google Cache
  • 7. Google Hacking • Google hacking is a term that refers to the art of creating complex search engine queries in order to filter through large amounts of search results for information related to computer security.
  • 8. How it Works ? • Google Search indexes everything that is made public including “virtual notebooks” and the information stored within that notebook in their search results. • Google is one of the most powerful databases in the world
  • 9. Information disclosure with Google • Private information • Remote Admin Interface • Configuration management • Error messages • Backup files • Public vulnerabilities • Technology Profile
  • 12. Google Operators “Operators are used to refine the results and to maximize the search value. They are your tools as well as hackers’ weapons”
  • 13. Google Operators • Basic Operators  +, -, ~ , ., *, “”, |, OR • Advanced Operators  allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange
  • 14. Basic Operators • (+) force inclusion of something common – Google ignores common words (where, how, digit, single letters) by default: – Example: StarStarWars Episode +I • (-) exclude a search term – Example: apple –red • (“) use quotes around a search term to search exact phrases: – Example: “Robert Masse” – Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results • (~) search synonym: – Example: ~food – Return the results about food as well as recipe, nutrition and cooking information • ( . ) a single-character wildcard: – Example: m.trix – Return the results of M@trix, matrix, metrix……. • ( * ) any word wildcard
  • 15. Advance Operators “Site” • Advance Operator : “Site” – Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain – Examples: • site:com • site:osscube.ca • site:www.osscube.ca
  • 16. Advance Operators “Filetype” • Advanced Operators: “Filetype:” – Filetype: extension_type – Find documents with specified extensions – Example • filetype:pdf • filetype:xls • Site:osscube.com filetype:pdf • Site:osscube.com filetype:txt • Budget filetype: xls
  • 17. Advance Operators “Intitle” • Advanced Operators “Intitle:” – Intitle: search_term – Find search term within the title of a Webpage – Allintitle: search_term1 search_term2 search_term3 – Find multiple search terms in the Web pages with the title that includes all these words – These operators are specifically useful to find the directory lists – Example: • Find directory list: • Intitle: Index.of “parent directory”
  • 18. Advance Operators “Inurl” • Advanced Operators “Inurl:” – Inurl: search_term – Find search term in a Web address – Allinurl: search_term1 search_term2 search_term3 – Find multiple search terms in a Web address – Examples: • Inurl: cgi-bin • Allinurl: cgi-bin password
  • 19. Advance Operators “Intext” • Advanced Operators “Intext;” – Intext: search_term – Find search term in the text body of a document. – Allintext: search_term1 search_term2 search_term3 – Find multiple search terms in the text body of a document. – Examples: • Intext: Administrator login • Allintext: Administrator login
  • 20. Advance Operators “Cache” • Advanced Operators: “Cache:” – Cache: URL – Find the old version of Website in Google cache – Sometimes, even the site has already been updated, the old information might be found in cache – Examples: • Cache: www.osscube.com
  • 21. Advance Operators “<number1>..<number2>” • Advanced Operators – <number1>..<number2> – Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents – Examples: • Computer $500..1000 • DVD player $250..350
  • 22. Advance Operators “Link” • Advanced Operators “Link:” – Link: URL • Find the Web pages having a link to the specified URL – Related: URL • Find the Web pages that are “similar” to the specified Web page – info: URL • Present some information that Google has about that Web page – Define: search_term • Provide a definition of the words gathered from various online sources – Examples: • Link: osscube.com • Related: osscube.com • Info: osscube.com • Define: Network security
  • 23. References • http://www.googleguide.com/advanced_oper ators_reference.html • http://www.google.com/advanced_search • http://www.google.com/help/operators.html • http://www.exploit-db.com/google-dorks/ • http://www.hackersforcharity.org/ghdb/
  • 24. Google “Friend or Enemy” • Google is everyone’s best friend (yours or hackers) • Information gathering and vulnerability identification are the tasks in the first phase of a typical hacking scenario • Passitive, stealth and huge data collection • Google can do more than search • Have you used Google to audit your organization today?
  • 26. Thank you! Email : kaushal@osscube.com