πŸ”° How Google Dorks is used by hackers to gain the sensitive information πŸ”°

β€œinurl: domain/” β€œadditional dorks

A hacker would simply use in the desired parameters as follows:

inurl = the URL of a site you want to querydomain = the domain for the sitedorks = the sub-fields and parameters that a hacker wants to scan

The best way to use Google dorks legally is to find vulnerabilities on your own website.

We can also use other search filed than URL that will help to uncover a lot of information about a site.

intitle:
inurl:
intext:
define:
site:
phonebook:
maps:
book:
info:
movie:
weather:
related:
link:

Also Read: Latest Dorks List Collection for SQL Injection – SQL Dorks 2018

Some of the Example :

info: The query [info:] will present some information that Google has about that web page. For instance, [info:www.google.com]will show information about the Google homepage. Note there can be no space between the β€œinfo:” and the web page url.

link: The query [link:] will list webpages that have links to the specified webpage. For instance, [link:www.google.com] will list web pages that have links pointing to the Google homepage. Note there can be no space between the β€œlink:” and the web page url.

site: If you include [site:] in your query, Google will restrict the results to those websites in the given domain. For instance, [help site:www.google.com] will find pages about help within www.google.com. [help site:com] will find pages about help within .com urls. Note there can be no space between the β€œsite:” and the domain.

inurl: If you include [inurl:] in your query, Google will restrict the results to documents containing that word in the url. For instance,[inurl:google search] will return documents that mention the word β€œgoogle” in their url, and mention the word β€œsearch” anywhere in the document (url or no).

Leave a Reply

Your email address will not be published. Required fields are marked *