• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

How to Find Vulnerable Vulnerabilities Using Google Dorks

AnonyViet by AnonyViet
August 26, 2023
in Security
0

Google’s advanced search operators are called Google Dorking. Why can hackers use this technique to find vulnerable vulnerabilities? In a word, this technique uses Google to search for exactly what you want using specific keywords or commands. Basically, it narrows down the search to find what you need. How to Find Vulnerable Vulnerabilities Using Google Dorks

Join the channel Telegram belong to AnonyViet ???? Link ????

Google Dorking uses some of the inherent capabilities of google to find exact things on the internet through specific search strings. It can be log files, error files, webcams opened on the internet and even internal or admin pages that give us access to the device. In some cases, you can also find the password in the error log file. Sometimes even the administrative configuration files are exposed to the internet because the server is set up incorrectly.

How to Find Vulnerable Vulnerabilities Using Google Dorks 8

Google Dorking is done by Google search operators. Some typical operators:

  • site: – used to limit search results to a specific site. For example, google to find hack related blogs on the website https://gourav-dhar.com:
    hacking site:gourav-dhar.com
  • inurl: – is used to specify which keywords should be in the URL. For the above query, if you want the URL to contain ethical, you can use:
    hacking site:gourav-dhar.com inurl:ethical

You will get the following results:

How to Find Vulnerable Vulnerabilities Using Google Dorks 9

  • intext: – This operator checks the parameters contained in the site’s metadata (i.e. the information you see on the title and description of a google search).
  • intitle: – Results will only return pages that contain the keyword in the HTML title
  • allintitle : – Search for all keywords specified in the title.
  • allinurl : – Search all keywords in url.
  • filetype: – Look for clear document types. filetype:pdf will search for pdf files contained in web pages
  • ext: – Same as filetype. ext:pdf finds the pdf extension.
  • cache : – Used to see the Google cached version of a web page

And there are several other search operators that can also be found via Google Search.

How to Find Vulnerable Vulnerabilities Using Google Dorks

1. Check the log for login information

allintext:username filetype:log

How to Find Vulnerable Vulnerabilities Using Google Dorks 10

We will get a list of log files containing “username”. This can be useful to hackers if the log contains user credentials. If you explore the results a bit and apply filters, you should be able to find a username or password for further mining.

2. Find vulnerable webcams

Google intitle:”webcamxp 5" and you’ll find a list of webcams that you can access right away.

How to Find Vulnerable Vulnerabilities Using Google Dorks 11

I can watch live webcams of some classes. How to Find Vulnerable Vulnerabilities Using Google Dorks 12

The best place for you to start practicing is Google Hacking Database. If you are unsure about search operators, then you should check out this site. Some people have searched before so you can use their search queries. The Google Hacking Database or Exploit Database looks like the image below and you can enter your queries in the top right.

How to Find Vulnerable Vulnerabilities Using Google Dorks 13

Summary of Google Dorks

What I just did above is not illegal. We are only looking for information that has already been made public. Hackers use google dorks to find information that may have been accidentally made public. However, it is up to the person to use this information.

Rate this post

Tags: DorksFindGoogleVulnerabilitiesVulnerable
Previous Post

Synthesize beautiful characters used to name Facebook and Game

Next Post

How to find Stored XSS errors simply

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
How to find Stored XSS errors simply

How to find Stored XSS errors simply

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Learn about En81 safety standards for home elevators

Learn about En81 safety standards for home elevators

May 12, 2025
Change super easy Windows folder icon

Change super easy Windows folder icon

May 12, 2025
How to use Auto Share Facebook to increase the article sharing

How to use Auto Share Facebook to increase the article sharing

May 12, 2025
How to check the chatgpt chatGPT about you?

How to check the chatgpt chatGPT about you?

May 11, 2025
Learn about En81 safety standards for home elevators

Learn about En81 safety standards for home elevators

May 12, 2025
Change super easy Windows folder icon

Change super easy Windows folder icon

May 12, 2025
How to use Auto Share Facebook to increase the article sharing

How to use Auto Share Facebook to increase the article sharing

May 12, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Learn about En81 safety standards for home elevators

Learn about En81 safety standards for home elevators

May 12, 2025
Change super easy Windows folder icon

Change super easy Windows folder icon

May 12, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso