Sponsored
Web Penetration Testing

Google Advance Hacking – Google Dorks

Hey folks, in this tutorials we will discussing about the Google Advance Search Engine known as Google Dorks.

What is Google Advance Search ( Google Dorks ) ?

Google Dorks useful for passive information gathering purposes. This is the best way to reconnaissance about the target website even the target site doesn’t know about our reconnaissance. This is the passive method, with the help of this we can get accurate details about the target. Therefor google dorks also know as google hacking because it can be used by hacker in order to find security holes in the configuration.

Lets take a look 🙂 !!

Site Directive

If we want only the results in any site that contain these words so we will browse the following command.
Usage 🙂 <- Your words site:any site URL ->

cbse pdf site:cbseportal.com

Extension

If our need to find only the PDF extension in any website then we will use extension technique.
Usage 🙂 <- ext:any extension site:any site URL ->

ext:pdf site:cbseportal.com

InURL

Now If we want to match a particular key word in the website URL or body then we can use the inurl directive.
Usage 🙂 <- inurl:/ any key word site:any site URL ->

inurl:/downloads site:apkpure.com

InTitle

If we want only the user login panel in our search to perform brute force attack then we can use the intitle directive.
Usage 🙂 <- inurl:/ any key word site:any site URL ->

intitle:"Login" site:.com

InText

If we want to received the details of those website which is running on the WordPress blogging software, then we can use the Intext directive Which will help in finding results with the help of body text.
Usage 🙂 <- intext: “any key word” site:any site URL ->

intext:"Powered by WordPress" site:co.in

Social Media Sites

Suppose I have found a project in which I have to submit details of multiple profiles but have only single name. So I can choose Google dork to search multiple profiles in one click.
Usage 🙂 <- site: multiple domain profiles name ->

site:linkedin.com/in shubham

Add Filters

If we want to found the social media profiles with specific location so we have to add address details in our search.
Usage 🙂 <- site: multiple domain profiles name location address ->

site:linkedin.com/in shubham delhi address

Specific Field’s

Now we will get the profiles that are related to the security sector.
Usage 🙂 <- site: “multiple domain” “profiles name” “location address” “field’s” ->

site:linkedin.com/in "shubham" "delhi address" "security"

Profiles Emails

If we want to contact the profile through gmail then we can take help of this facilities.
Usage 🙂 <- intext: “gmail.com” site: “name of domain” ->

intext:"gmail.com" site:linkedin.com/in shubham

Emails From Website

This will give all Gmail addresses that are included in those websites such as owners, comment and employees etc.
Usage 🙂 <- intext: “gmail.com” search ” Topcis “ ->

intext:"gmail.com" search "hack andorid phone kali linux"

Site Owners Email

Most owners place their email address in the about section for inquiry or contact. Hence we will use the following command to get the Gmail addresses of the website owners.
Usage 🙂 <- intext: “about us” > intext:”gmail.com” ->

intext:"about us" > intext:"gmail.com"
About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin and Twitter.
Sponsored

View Comments

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.