• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result
Home Security

How to Find Vulnerable Vulnerabilities Using Google Dorks

AnonyViet by AnonyViet
August 26, 2023
in Security
0
0
SHARES
Share on FacebookShare on Twitter

Google’s advanced search operators are called Google Dorking. Why can hackers use this technique to find vulnerable vulnerabilities? In a word, this technique uses Google to search for exactly what you want using specific keywords or commands. Basically, it narrows down the search to find what you need. How to Find Vulnerable Vulnerabilities Using Google Dorks

Join the channel Telegram belong to AnonyViet ???? Link ????

Google Dorking uses some of the inherent capabilities of google to find exact things on the internet through specific search strings. It can be log files, error files, webcams opened on the internet and even internal or admin pages that give us access to the device. In some cases, you can also find the password in the error log file. Sometimes even the administrative configuration files are exposed to the internet because the server is set up incorrectly.

How to Find Vulnerable Vulnerabilities Using Google Dorks 8

Google Dorking is done by Google search operators. Some typical operators:

  • site: – used to limit search results to a specific site. For example, google to find hack related blogs on the website https://gourav-dhar.com:
    hacking site:gourav-dhar.com
  • inurl: – is used to specify which keywords should be in the URL. For the above query, if you want the URL to contain ethical, you can use:
    hacking site:gourav-dhar.com inurl:ethical

You will get the following results:

How to Find Vulnerable Vulnerabilities Using Google Dorks 9

  • intext: – This operator checks the parameters contained in the site’s metadata (i.e. the information you see on the title and description of a google search).
  • intitle: – Results will only return pages that contain the keyword in the HTML title
  • allintitle : – Search for all keywords specified in the title.
  • allinurl : – Search all keywords in url.
  • filetype: – Look for clear document types. filetype:pdf will search for pdf files contained in web pages
  • ext: – Same as filetype. ext:pdf finds the pdf extension.
  • cache : – Used to see the Google cached version of a web page

And there are several other search operators that can also be found via Google Search.

How to Find Vulnerable Vulnerabilities Using Google Dorks

1. Check the log for login information

allintext:username filetype:log

How to Find Vulnerable Vulnerabilities Using Google Dorks 10

We will get a list of log files containing “username”. This can be useful to hackers if the log contains user credentials. If you explore the results a bit and apply filters, you should be able to find a username or password for further mining.

2. Find vulnerable webcams

Google intitle:”webcamxp 5" and you’ll find a list of webcams that you can access right away.

How to Find Vulnerable Vulnerabilities Using Google Dorks 11

I can watch live webcams of some classes. How to Find Vulnerable Vulnerabilities Using Google Dorks 12

The best place for you to start practicing is Google Hacking Database. If you are unsure about search operators, then you should check out this site. Some people have searched before so you can use their search queries. The Google Hacking Database or Exploit Database looks like the image below and you can enter your queries in the top right.

How to Find Vulnerable Vulnerabilities Using Google Dorks 13

Summary of Google Dorks

What I just did above is not illegal. We are only looking for information that has already been made public. Hackers use google dorks to find information that may have been accidentally made public. However, it is up to the person to use this information.

Rate this post

Tags: DorksFindGoogleVulnerabilitiesVulnerable
Previous Post

Synthesize beautiful characters used to name Facebook and Game

Next Post

How to find Stored XSS errors simply

AnonyViet

AnonyViet

Related Posts

SQL Injection Payload List
Security

SQL Injection Payload List

September 9, 2023
Exploiting XSS with Javascript/JPEG Polyglot
Security

Exploiting XSS with Javascript/JPEG Polyglot

September 8, 2023
AnvRS – Reverse Shell Bypass Antivirus Tool
Security

AnvRS – Reverse Shell Bypass Antivirus Tool

August 29, 2023
How to find Stored XSS errors simply
Security

How to find Stored XSS errors simply

August 26, 2023
BigBountyRecon: Google Dork Spying Tool
Security

BigBountyRecon: Google Dork Spying Tool

August 12, 2023
Phishing method by attaching malicious files on Office 365
Security

Phishing method by attaching malicious files on Office 365

August 11, 2023
Next Post
How to find Stored XSS errors simply

How to find Stored XSS errors simply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent News

How to Comment on a smiley face with a long mouth on Facebook

How to Comment on a smiley face with a long mouth on Facebook

September 23, 2023
How to use StandBy mode of iPhone iOS 17

How to use StandBy mode of iPhone iOS 17

September 22, 2023

Use Aquarium on the browser to check if the computer configuration is strong

September 22, 2023
Download Panel TMV: Free photo editing panel for Photoshop

Download Panel TMV: Free photo editing panel for Photoshop

September 21, 2023
How to Comment on a smiley face with a long mouth on Facebook

How to Comment on a smiley face with a long mouth on Facebook

September 23, 2023
How to use StandBy mode of iPhone iOS 17

How to use StandBy mode of iPhone iOS 17

September 22, 2023

Use Aquarium on the browser to check if the computer configuration is strong

September 22, 2023
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

How to Comment on a smiley face with a long mouth on Facebook

How to Comment on a smiley face with a long mouth on Facebook

September 23, 2023
How to use StandBy mode of iPhone iOS 17

How to use StandBy mode of iPhone iOS 17

September 22, 2023
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.