top of page
Programming

Finding Vulnerable Info Using Google Dorks — Ethical Hacking

Updated: Oct 13, 2022

Google Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet.


What is Google Dorking?

Advanced use of Google Search Operator is called Google Dorking. In simple terms, it is using Google to run targeted search queries using specific keywords or commands. Basically narrowing down the search to find what we are looking for.


Google Dorking uses some of google’s inherent abilities to find things on the internet that we can find via specific search strings. These can be log files, error files, webcams opened to the internet, and even internal pages or admin that allow us to get into a device. In some cases, you can also find passwords in error logs. Sometimes even the administration config files are exposed to the internet due to the server being incorrectly set up.


Google Dorking is done by Google Search Operators. A few of them are :

  1. site:<keyword> — used to limit the search results to a particular site. For eg., to google for hacking-related blogs on my website https://gourav-dhar.com. I would write :

hacking site:gourav-dhar.com
  1. inurl:<keyword> — used to specify which keyword should be present in the URL. For the above query if I want to add a filter saying the URL should contain the string ethical I can write it as

hacking site:gourav-dhar.com inurl:ethical

You will get the following result :

  1. intext:<keyword> — This filter will check for the parameters being present in the meta-information of the website(i.e. the information you see on the title and description of a google search).

  2. intitle:<keyword> — Result will return only those pages having the keyword in their HTML title

  3. allintitle :<keyword>— searches for all the specified terms in the title.

  4. allinurl :<keyword> — searches for all terms in the url.

  5. filetype:<keyword> — Looks for explicit document types. filetype:pdf will searches for pdf files in sites

  6. ext:<keyword> — Like filetype. ext:pdf finds pdf extension.

  7. cache :<keyword> — Used to see Google’s cached version of a site


And there are a few other Search Operators as well which can be found via Google Search. Let me show you some of the cool stuff you can do with it.

Let’s look at some of the cool things we can do with it.


1. Checking logs for credentials

allintext:username filetype:log

We will get a list of log files that contain the text “username”. This can be useful (for hackers) if the log by mistake contains the user credentials. If you explore the results a little bit and apply filters, you will be able to find usernames or passwords for further exploitation.


2. Webcamas are super safe right — — Naaaah!

Google — intitle:”webcamxp 5" and you will find a list of webcams you can dive right into.


Look at this, live preview of some random lab it seems. Does anyone happen to know which place this is 😆


A good point to start is the Google Hacking Database. https://www.exploit-db.com/google-hacking-database. If you are not sure about the query strings and how to frame them. Go to this site and search for it. Several people have done it before so you can use their search queries. The Google Hacking Database or the Exploit Database looks like this and you can enter your queries on the top right.


Summarising Google Dorks

Doing whatever I did above is not illegal. We are fetching information that has already been made public. Hackers make use of google dorks to find information that might have accidentally been made public. However, using the information that has been presented to do something which can be troublesome for someone is crossing the line.


This blog was originally published in the personal blog website of Gourav : https://gourav-dhar.com

56 Comments


As a final-year university student, staying on top of multiple deadlines can be quite demanding. I always aim to maintain a high standard in all my coursework. Managing expectations and maintaining consistency across all subjects is no easy task. One option that has helped me stay ahead is Assignment Help Leeds, which offers well-structured and properly researched content. It has allowed me to focus more on learning and less on formatting or referencing, which can be very time-consuming for someone like me who prefers to spend more time understanding the core material.

Like

Being a computer science student means facing a lot of technical assignments with complex requirements. While I enjoy coding, some theoretical papers take more time than I can spare during exam weeks. I tried Assignment Help England to see if it could support my Assignment, and the result was better than expected. It gave me a clear direction and helped me meet my academic goals without feeling overwhelmed. The experience felt more like collaboration than anything else, and it’s something I’ll rely on again during high-pressure weeks in the semester.

Like

I'm a final-year business student aiming to maintain top grades while applying for internships. With so much going on, I always look for smart ways to stay ahead in my academics.

One of the tools I rely on is instant assignment help which has proven effective during high-pressure periods. The detailed explanations and organized structure I received boosted both my understanding and confidence in key topics across various subjects, making my academic planning much smoother.

Like

This was an eye-opening read! The way Google Dorks can be used to uncover hidden vulnerabilities highlights just how powerful search engines really are—both in ethical hacking and in raising awareness about cybersecurity risks. Your breakdown made complex concepts easy to grasp, which is great for beginners exploring ethical hacking.


Interestingly, techniques like these are also being studied in business-related courses, especially in the context of digital risk and data privacy. When diving into such interdisciplinary topics, many students benefit from business assignment help to connect technical skills with real-world business implications. It bridges the gap between understanding cybersecurity and applying it in business strategies.

Edited
Like

If your assignment feels like it's written in an alien language, you’re not alone. I once tried to DIY a stats project and ended up wasting 2 nights. Now I just rely on folks who offer the Best Assignment Help when I’m out of depth — smarter not harder, right?

Like
download (7)_edited.png
Subscribe to my Youtube Channel @codewithgd

Related Articles

Videos you might like

Let's Get
Social

  • alt.text.label.Twitter
  • alt.text.label.LinkedIn
  • 25231
Subscribe to our NewsLetter

Join our mailing list to get a notification whenever a new blog is published. Don't worry we will not spam you.

bottom of page