Updated List and Database in 2022

ByBecky Patton

Mar 24, 2022 #1990'S Music And Fashion, #1990s Fashion In Nyc, #2016 Teen Grunge Fashion, #American Genderless Clothing Fashion Brands, #Androgynous Fashion Staples, #Best Sneakers Fashion 2021, #Boho Fashion Side View, #Creative Fashion Case Iphone 6, #Cut And Run Fashion, #Fashion And Physique Exhibit, #Fashion Art Magazine, #Fashion Art School Books, #Fashion Brands That Support Wwf, #Fashion Catalog Wakesha Wi, #Fashion Designer Course Name, #Fashion Photography Austrailia, #Fashion Runaway Tv Tropes, #Fashion Spread Polaroids, #Fashion Women 50s, #Fast Fashion Lead, #Fast Fashion Razer Back Top, #Fit Museum Black Fashion Designers, #French Women Fashion 16th Centuryrenaissance, #Grey Lumpy Wtf Fashion, #High Fashion Metal, #Johnston And Murphy Fashion, #Juergen Teller Fashion Photoshoot 2007, #Justin Timberlake Fashion 2020, #Karen Sterling Fashion Maniac, #Kpop Fashion Finds, #Lens Kit For Fashion Shoot, #Library Fashion Lauren Lail, #Mary Quant Fashion 1966, #Maternity Jean Fashion, #Mix And Match Fashion Software, #Plus Size Fashion Farmers Market, #Plus Size Fashion Outfits Winter, #Polar Shirt Fashion, #Polaris Fashion Center Stores, #Professional Athlete In To Fashion, #Saint Robert West Fashion, #Ses Fashion Trailer, #Shindong Airport Fashion, #Teen Fashion Editorials, #Teenage Girls Teen Fashion 2021, #Totsy Flair Fashion, #Vanitha Magazine Fashion Attire, #Variation Of Skirts In Fashion, #Victorian Women'S Fashion 1857, #Wholesale Fashion Backpacks Manufacturers

Using Google Dorks For Hacking

Google is the most popular search engine on the internet right now. People use it to find their answers, images, videos, news, notes, etc. But, did you know that Google can also help hackers to find vulnerable targets and steal unauthorized information?. Google is as much helpful for hackers as any other general user.

Hackers use the Google search engine to find Vulnerable systems (Be it a database, website, security cameras, or any IoT gadget) with the help of some special search queries. There are many Google search engine queries that can uncover vulnerable systems and/or sensitive information disclosures. These queries are known as Google Dorks.

Note: This article is only for educational purposes. You can use this knowledge to increase your system’s security or for any ethical purpose.

What is Google Dork or Google Dorking?

In 2002, Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems or sensitive information disclosures. He labeled them Google dorks.  Some people call it Google hacking.

Google Dorking is the method for finding vulnerable targets using Google dorks. Google Dorking can return usernames and passwords, email lists, sensitive documents, and website vulnerabilities.

Ethical Hackers use Google Dorking to improve system security. Black hat hackers use this technique for illegal activities, including cyber terrorism, industrial espionage, and identity theft.

Google dorks can find Footholds, Sensitive Directories, Vulnerable Files, Vulnerable Servers, Network or Vulnerability Data, Various Online Devices, Files Containing Usernames and Passwords, Sensitive Online Shopping Info and Pages Containing Login Portals.

List of Google Dork Queries (Updated List)

Google dork Queries are special search queries that can be searched as any other query you search on the Google search engine. You just need to type the query in the Google search engine along with the specified parameters.

1. Google Dorks For Hacking websites

google dorks for website hacking

  • intitle: This dork will tell Google to show only those pages that have the term in their HTML title. For example: intitle:”login page” will show those pages which have the term “login page” in the title text.
  • allintitle: It is similar to intitle but looks for all the specified terms in the title. For example: allintitle:”login page”
  • inurl: It searches for the specified term in the URL. For example inurl:”login.php” and inurl:proftpdpasswd 
  • allinurl: It is similar to inurl but looks for all the specified terms in the URL. For example: allinurl:”login.php”.
  • define: Google will define this message and will look for what had this error. For example: define:”sql syntax error”
  • site: This dork will return all the pages of a particular website that is crawled by Google. For example, site:technotification.com.
  • link:  It will also look in the site for URLs that possibly are vulnerable to SQL injection. For example: link:index.php?id= 

2. Google Dorks For Hacking Files

google dorks for file hacking

  • filetype: Searches for specific file types. filetype:pdf will look for pdf files in websites. filetype:txt looks for files with .txt extension. This way you can search for a file with any extension like mp4, mp3, Mkv, etc. site:onedrive.live.com shared by
  •  intitle: You can look into file directories of websites directly and download specified file intitle: index of mp3 for mp3 files. You can replace mp3 with any other extension. You can also use to find any particular movie or game.  intitle: “index of ” intext: “movie name” .
  • book: find any book using Google search engine. for example book: java

3. Google Dorks for finding username and passwords

google dorks for password hacking

  • intext: passwords filetype: txt
  • mysql history files
  • intext: account details filetype: txt
  • intitle:index.of intext:”secring .skr”|&q…
  • people.lst
  • passwd
  • master.passwd
  • pwd.db
  • htpasswd / htpasswd.bak
  • htpasswd / htgroup
  • spwd.db / passwd
  • passwd / etc (reliable)
  • config.php
  • passlist

4. Google Dorks For Hacking Security Cameras

google dorks for camera hacking

Type any of these queries into google to find vulnerable security cameras

  • Inurl:”CgiStart?page=”
  • inurl:/view.shtml
  • intitle:”Live View / – AXIS
  • inurl:view/view.shtml
  • inurl:ViewerFrame?Mode=
  • inurl:ViewerFrame?Mode=Refresh
  • inurl:axis-cgi/jpg
  • inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
  • inurl:view/indexFrame.shtml
  • inurl:view/index.shtml
  • inurl:view/view.shtml
  • liveapplet
  • intitle:”live view” intitle:axis
  • intitle:liveapplet
  • allintitle:”Network Camera NetworkCamera” (disconnected)
  • intitle:axis intitle:”video server”
  • intitle:liveapplet inurl:LvAppl
  • intitle:”EvoCam” inurl:”webcam.html”
  • intitle:”Live NetSnap Cam-Server feed”
  • intitle:”Live View / – AXIS”
  • inurl:indexFrame.shtml Axis

These are the most common search queries used by the hackers. However, there is a big database of such queries available at HackersForCharity called Google Hacking Database. You can find more google dorks in this database.