#OSINT Technique - Google Dorking
OSINT Technique - Google Dorking
Google has a lot of power built into itβs search bar. Itβs one of many tools used by #infosec to perform Open Source INTelligence research. Here are some dorks to find items of interest, edit and try them out! π
#30DaysOfThreads
Searching a specific site and its subdomains πͺ
You donβt have to search the entire internet, you can focus a search to a specific site and its subdomains.
- site: twitter.com 0xBanana
- site: cnn.com juggling
Searching for a specific filetype
There are so many file types out there, using the filetype operator we can focus on types of interest.
Want to find: Videos? Documents? Zips? Try it out!
- filetype: pdf
- filetype: pptx
All formats ππ½
In the title of the page π°
Page titles tell us a lot about the page we’re looking at and can be common across tools, companies, and developers. They’re short and usually have important information or keywords in them.
- intitle:“index of”
- intitle: login
In the text of the page π
Searches for specific text contained on any web page, wrap multiple words in quotes.
- intext:“Host Vulnerability Summary Report”
- intext:“Network Vulnerability Summary Report”
- intext:“Executive Summary”
Multiple Fields π
Some operators can be mixed while others can only be used alone. See img
- site:cnn.com filetype:“xls | xlsx | doc | docx | ppt | pptx | pdf” (filetype OR)
- site:cnn.com intext:“Japan” intext:“Juggling” intext:“emperor” (text AND)
What are some google dorks that you like? What sort of things are you interested in finding?
- File Dumps?
- Corporate Secrets?
- Login Portals?
- Criminal Enterprises?
Share below!
If you enjoyed this post let me know! ππ¦π