Google hacking
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use.
Basics
"Google hacking" involves using advanced operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. A search query withintitle:admbook intitle:Fversion filetype:php
would locate all web pages that have that particular text contained within them. It is normal for default installations of applications to include their running version in every page they serve, for example, "Powered by XOOPS 2.2.3 Final".Devices connected to the Internet can be found. A search string such as
inurl:"ViewerFrame?Mode="
will find public web cameras.Another useful search is following
intitle:index.of
followed by a search keyword. This can give a list of files on the servers. For example, intitle:index.of mp3
will give all the MP3 files available on various types of servers.Advanced operators
There are many similar advanced operators which can be used to exploit insecure websites:Operator | Purpose | Mixes with Other Operators? | Can be used Alone? | Web | Images | Groups | News |
intitle | Search page Title | yes | yes | yes | yes | yes | yes |
allintitle | Search page title | yes | yes | yes | yes | yes | yes |
inurl | Search URL | yes | yes | no | yes | completely | like intitle |
allinurl | Search URL | yes | yes | yes | yes | yes | like intitle |
filetype/ext | specific files | yes | yes | yes | yes | completely | - |
intext | Search text of page only | yes | yes | yes | yes | yes | yes |
allintext | Search text of page only | yes | yes | yes | yes | no | |
site | Search specific site | yes | yes | no | yes | yes | completely |
link | Search for links to pages | yes | yes | yes | yes | yes | completely |
inanchor | Search link anchor text | yes | yes | yes | yes | completely | yes |
numrange | Locate number | yes | yes | yes | yes | yes | completely |
daterange | Search in date range | yes | yes | yes | completely | completely | completely |
author | Group author search | yes | yes | yes | yes | yes | completely |
group | Group name search | yes | yes | yes | yes | completely | |
insubject | Group subject search | yes | yes | like intitle | like intitle | yes | like intitle |
msgid | Group msgid search | yes | yes | completely | yes |
History of Google hacking
The concept of "Google hacking" dates back to 2002, when Johnny Long began to collect Google search queries that uncovered vulnerable systems and/or sensitive information disclosures – labeling them googleDorks.The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database in 2004.
Since its heyday, the concepts explored in Google hacking have been extended to other search engines, such as Bing and Shodan. Automated attack tools use custom search dictionaries to find vulnerable systems and sensitive information disclosures in public systems that have been indexed by search engines.