Index Of Movies, Download Movies 2017,2018, Download New Movie. Inurl: word, the search results will contain in the URL the word after the dork. Report' nessus filetype:pem intext:private filetype:properties inurl:db. Ini file can list IRC usernames and index.of.dcim index.of.password intext:'.
It is estimated that Google has downloaded more pages than any other search engine in the field. With over billions of pages and a relatively low execution time, the popular Californian search engine is able to satisfy all research, both for educational purposes and for purely curiosity purposes.
The search engine is so powerful that it can categorize more than 15 million pages in less than a minute. But it was not always like this: in 1999 it took more than a month for such operation. In addition, it is assumed that more than 60,000 searches are conducted per second through the popular Google search engine. This means over 1000 billion searches a year! Astronomical numbers to which Google manages to stay behind with the huge infrastructure.
Search engines have improved the lives of many people: having so much information within 1 minute is a point of reflection for anyone. Yet not everyone is able to take full advantage of the popular Google search engine. In the last days, from a research conducted by an important company seems to have emerged the inability of many people, students and not, to find something on a specific topic through search engines.
Google Dorks
Dorks are defined as research texts, prepared in a limited way for the purpose, made up of different keywods, which are fed into a search engine to obtain specific results. Those are also called “query”.
Purposes
The dorks are mainly used to refine the search results, in order to have more specific links.
A very concrete example could be the searching of Neapolitan pizza. The keyword pizza, searched on Google, has over 1,010,000,000 results while the keywords combined Neapolitan pizza have already several results in less. This is already an attempt to refine our research. Having many different results both for quality and for origin, we always need to narrow down the search field.
Assuming that some technician may not have applied some security rules, you can looking for some confidential and / or confidential files, not intended for the public of the Internet. But not only that, vulnerabilities are sought by kiddie scripts right through Google. A careful query in fact looks for error messages, configuration files or other that could in some way expose the software version or other.
Syntax
The google dorks are really syntactically basic, they all follow the same syntax:
namedork: parameter
Specials characters
Dork | Description | Example |
---|---|---|
Double apexes [ “search string” ] | Double quotes are used to search for a specific word or a set of words written exactly that way. | “gelato” |
Minus sign [ -string ] | The minus sign in front of the word tells Google to exclude that specific word from the search. | -cripto |
Tilde [ ~string ] | Specifically, it indicates a Google to search its synonyms over a word. | ~car |
Operator “OR” [string OR string_2] | This logical operator tells Google to look for a word or the other. It can also be used more than once. | [monero OR serhack] |
Helpful and useful google dorks
Dork name | Description | Example |
---|---|---|
site: domain | search results will be files and pages in the domain specified by domain | site:w3school.com |
intitle: word | the search results will contain in the title the word after the dork “intitle” | intitle:hi |
inurl : word | the search results will contain in the URL the word after the dork “inurl” | inurl:gallery |
filetype: type | search results will contain files of the extension specified by type | filetype:pdf |
cache: url | redirect the user to the Google cache of the url specified | cache:serhack.me |
info: root domain | the search result will contain the root domain ( root domain ) and all the information that Google has | info:amazon.com |
Personal feedback
Personally, I think that the Google dorks help a lot, both those who have good intentions and those who, unfortunately, it has bad. In fact, there are more and more social engineering attacks, using confidential and internal data discovered through a simple search.