top of page
Writer's pictureTyler Wall

How to Hack with Google

Updated: Dec 8



Google Dorking OSINT


How to Hack with Google

Google is a powerful tool for reconnaissance. It is also a great way to find sensitive information online using what's known as Google Dorks. Google Dorking, also known as Google Hacking, is a search technique that uses advanced search operators to find information on the internet that may not be available through standard search queries. It uses Google's search algorithms to find specific text strings in search results. Notably, while the term “hacking” suggests an illicit activity, Google Dorking is entirely legal and often used by security professionals to identify vulnerabilities in their systems.


While Google Dorking can reveal sensitive information if it’s publicly accessible, using this technique doesn’t breach any laws or Google’s terms of service. This is how to hack with Google.

Different Google Dorking Techniques

Google Dorking techniques primarily involve using specific search operators. Below are some of the most commonly used methods:


  1. Filetype: This operator searches for specific file types. For example, `filetype:pdf` would return PDF files.

  2. Inurl: The `inurl:` operator can be used to find specific words within the URL of a page. For example, `inurl:login` would return pages with ‘login’ in the URL.

  3. Intext: With the `intext:` operator, you can search for specific text within the content of a web page. For example, `intext:”password”` would yield pages that contain the word “password”.

  4. Intitle: The `intitle:` operator is used to search for specific terms in the title of a webpage. For example, `intitle:”index of”` could reveal web servers with directory listing enabled.

  5. Link: The `link:` operator can be used to find pages that link to a specific URL. For example, `link:example.com` would find pages linking to example.com.

  6. Site: The `site:` operator allows you to search within a specific site. For example, `site:example.com` would search within example.com.


These techniques are powerful tools for information gathering and should be used responsibly. While Google Dorking is legal and can be used for legitimate research and security purposes, misuse can violate privacy and potentially be illegal.


The Google Hacking Database

The Google Hacking Database (GHDB) is a collection of Google search queries, or "Google Dorks", that are organized into categories to help cybersecurity professionals identify potential vulnerabilities. The database was created in 2004 by cybersecurity researcher Johnny Long, who began collecting Google search queries in 2002 that uncovered sensitive information or vulnerable systems. 


Attackers use the GHDB as a tool for advanced Google searching and information gathering. For example, the wildcard operator (*) can be used to search for variable words in a phrase, and the Site: operator can be used to find results on a specific website or domain. 


Google Dorking can also return information that isn't intended for public viewing.


Fast Finds

intitle:"hacked by" inurl:upload

inurl:/admin/login.php intitle:("Iniciar sesion" OR "hacked")

intitle:"(SSI Web Shell)" AND intext:"(ls -al)"

s3 site:amazonaws.com filetype:xls password

inurl: document/d intext: ssn



Hack NOW! course by Dr. Bryson Payne out now on the on-demand section of the website. 8.5 hours of learning to hack with quizzes and lab to earn your Certified Junior Hacker (CJH) certification.




Cyber NOW Education: How to start a career in cybersecurity

Tyler Wall is the founder of Cyber NOW Education. He holds bills for a Master of Science from Purdue University and CISSP, CCSK, CFSR, CEH, Sec+, Net+, and A+ certifications. He mastered the SOC after having held every position from analyst to architect and is the author of three books, 100+ professional articles, and ten online courses specifically for SOC analysts.


You can connect with him on LinkedIn.


You can sign up for a Lifetime Membership of Cyber NOW® with a special deal for 15% off with coupon code "KB15OFF" which includes all courses, certification, the cyber range, the hacking lab, webinars, the extensive knowledge base, forums, and spotlight eligibility, to name a few benefits.


Download the Azure Security Labs eBook from the Secure Style Store. These labs walk you through several hands-on fun labs in Microsoft Azure, leaving you with the know-how to create a gig in Fiverr or Upwork to start your cybersecurity freelancing.


Some of our free resources include the Forums, the Knowledge Base, our True Entry Level SOC Analyst Jobs, Job Hunting Application Tracker, Resume Template, and Weekly Networking Checklist. Ensure you create an account or enter your email to stay informed of our free giveaways and promos, which we often offer.


Check out my latest book, Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success, 2nd edition, published June 1st, 2024, and winner of the 2024 Cybersecurity Excellence Awards and a finalist in the Best Book Awards. If you enjoy audiobooks, I suggest the Audible version, but you can also get it in beautiful paperback, kindle, or PDF versions. The downloadable PDF version can be grabbed here.

144 views0 comments

Recent Posts

See All

Comments


bottom of page