Skip to main content

Google SQL Dorks – 2021

"index of" "plugins/wp-rocket" intitle:"index of" secrets.yml intitle:"index of /" "*key.pem" intitle:"index of" "admin/sql/" intext:"index of /" "config.json" index of .svn/text-base/index.php.svn-base intitle:"index of" admin.tar inurl:/servicedesk/customer/user/login Dork: "Index of" "upload_image.php" Dork: "index of" "Production.json" index.of.?.frm inurl:wp-content/plugins/brizy "Index of" "customer.php" inurl:adminlogin.jsp inurl:/download_file/ intext:"index of /" index of /backend/prod/config intext:"index of /" "customer.php" "~Login" intext:"INTERNAL USE ONLY" ext:doc OR ext:pdf OR ext:xls OR ext:xlsx intext:"Welcome to Intranet" "login" "Index of" "/access" inurl:admin/data* intext:index of intext:powered by JoomSport - sport Wo

What is Google Dork?



It is basically a search string that uses advanced search query to find information that are not easily available on the websites. It is also regarded as illegal google hacking activity which hackers often uses for purposes such as cyber terrorism and cyber theft.


Google Dorking can also be called Google Hacking techniques mostly used by hackers to exploit web apps that are vulnerable and extract information.


And to do this they make use of Google advanced search operators and SQL Dorks to locate the results with the strings.


SQL Injection: This a method that is employed attackers in order to take non-authentication input vulnerabilities and inject SQL commands within the web application which runs at the database backend.


Special google search operators

Before starting with google dorks, you need to have basic understanding of few special google search operators and also how it functions.

1. intitle:

This will ask google to show pages that have the term in their html title.

2. inurl:

Searches for specified term in the URL. For example: inurl:register.php

3. filetype:

Searched for certain file type. Example: filetype:pdf will search for all the pdf files in the websites.

4. ext:

It works similar to filetype. Example: ext:pdf finds pdf extension files.

5. intext:

This will search content of the page. This works somewhat like plain google search

6. site:

This limits the search to a specific site only. Example: site:abc@d.com will limit search to only abc@d.com.

7. Cache:

This will show you cached version of any website. Example: cache: aa.com

8. *

This works like a wildcard. Example: How to * sites, will show you all the results like “how to…” design/create/hack, etc… “sites”



Basic Formula of Dork

"inurl:."domain"/"dorks" "

Here,
“inurl” = input URL
“domain” = your desired domain ex. .gov
“dorks” = your dork of your choice




Comments

Popular posts from this blog

Google SQL Dorks – 2021

"index of" "plugins/wp-rocket" intitle:"index of" secrets.yml intitle:"index of /" "*key.pem" intitle:"index of" "admin/sql/" intext:"index of /" "config.json" index of .svn/text-base/index.php.svn-base intitle:"index of" admin.tar inurl:/servicedesk/customer/user/login Dork: "Index of" "upload_image.php" Dork: "index of" "Production.json" index.of.?.frm inurl:wp-content/plugins/brizy "Index of" "customer.php" inurl:adminlogin.jsp inurl:/download_file/ intext:"index of /" index of /backend/prod/config intext:"index of /" "customer.php" "~Login" intext:"INTERNAL USE ONLY" ext:doc OR ext:pdf OR ext:xls OR ext:xlsx intext:"Welcome to Intranet" "login" "Index of" "/access" inurl:admin/data* intext:index of intext:powered by JoomSport - sport Wo

13 BEST Operating System for Hacking in 2021

  1) Kali Linux     Kali Linux is a Security Distribution of Linux specifically designed for digital forensics and penetration testing. It has over 600 preinstalled penetration-testing applications (cyber-attack performs against computer vulnerability). This OS can be run on Windows as well as Mac OS. Features: It can be used for penetration testing. This platform is available in 32 bits as well as 64 bits. Kali Linux can be updated without the need to download a new version. This OS can encrypt the full disk. You can easily automate and customize the Kali Linux installation on the network. Support for USB live installs. It has a forensics mode that can be used for forensic work. Link:   https://www.kali.org/ 2) Parrot OS Parrot OS is a platform for hacking. It has an easy to use editor for software development. This platform enables you to surf the web privately and securely. Hackers can use Parrot OS to perform vulnerability assessment, penetration testing, computer forensics, and mo

Common types of cyber attacks

  Malware Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. Once inside the system, malware can do the following: Blocks access to key components of the network (ransomware) Installs malware or additional harmful software Covertly obtains information by transmitting data from the hard drive (spyware) Disrupts certain components and renders the system inoperable Phishing Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat. Man-in-the-middle attack Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers i