Introduction
Have you ever searched for a piece of information online (through Google or any popular search engines) and could not find it? That just makes you one of many people. Let’s delve into the backstory and possible reasons for this.
There are many search engines through which you can access the World Wide Web. However, Google is by far the most used search engine on the internet today. Just so you are sure, search engines are the windows to the huge library of information on the database called internet. Due to the large amount of information available on the internet today, it is only natural that users are faced with the problem of which source to choose from and which to believe. It would have also been a problem to navigate through the large volume of information to get fast and specific responses. Due to this, search engines like Google created a solution of sorting through the myriad of information and presenting the most relevant ones to the users.
Aside from the above problems, there would have been no way to ascertain the sensitivity of the information users are exposed to, considering how relevant pieces of information are in global balance. Furthermore, things like user safety and veracity of information. All of these things were the basis on which the algorithm of sorting these pieces of information works. Due to all of that, some sets of data become naturally unavailable when you search through search engines. Others that are not available become extremely difficult to find.
That does seem like another problem isn’t it? However, just like every masterpiece security system, there is always a backdoor to bypass the algorithm. In the instance of Google, one of the backdoor mechanisms available is Google dorking. If you are curious as to how this system works, then hop on the ride.
The sets of information above are protected by certain ethical barriers. No ordinary citizen is supposed to get access to them. However, what if you are a detective, newsroom journalist or an auditor of some government agency? How do you get access to these tiny yet essential details? That is where Google dorking is important. It is a method employed by ethical hackers to make queries on search engines when they are sourcing for very delicate pieces of information. Examples of these pieces of information include the tax files of certain big organizations, the data set of certain victims covered up by the government or pretty much any piece of info you would not find when you just conduct any normal search.
Not to create too much tension, this is not like some sort of secret exclusive to a certain cult. No! Pretty much anyone with the knowledge of basic search engine queries can carry out a Google Dorking operation. Besides, it does not require pulling a technical stunt or possessing a Harvard degree in cyber security. It all boils down to understanding some basic methods and instructing the computer to execute some basic commands. It allows any individual to be able to use the World Wide Web to its full capacity.
You may be wondering what possible advantage dorking could have in the sphere of cyber security. Dorking can be useful for a pen-tester in the analysis of the vulnerabilities of a specified web application. Furthermore, it can assist in providing deep insight when it comes to security and safety analysis of an existing web security structure – the loopholes, strengths, and even possible attack signs erstwhile hidden from the system administrator.
SO, WHAT ARE GOOGLE DORKS?
Google dorks are special search terms that are used to access specific sets of information that are not available with normal queries. The implication of this is that, there are some search terms that hold real importance to the Google search engine. The search box automatically assumes the functions of a command line when these search terms are input into it.
Of course, there is no limit to the kind of information that can be accessed through a thoroughly crafted dork. However, you should know that Google doesn’t just pull information out of thin air. These texts or images or documents or codes or videos must have been exposed mistakenly at one point or the other. The sole fact of mistaken exposure (and of course, sensitivity) goes to explain the reason for the subsequent obscurity.
There is a downside to Google Dorking and safety though; it can be pulled off by anyone who is privy to the specific line of commands. Not just ethical hackers.
There are quite a number of methods of getting different types of information using specific keywords:
LOG FILES - Log files are like databases (or more appropriately records). The existence of log files is a pointer to the ease of getting sensitive information on website. In most instances, some of a website’s sensitive logs can be found in the transfer protocol of these websites. Access to these logs gives access to the version of PHP and backend structure a particular website uses. The search terms for getting these logs are allintext: username file type (csv, PDF, xlsx): log
SUSCEPTIBLE WEB SERVERS – There are certain web servers that contain loopholes. Some web servers too have been hacked in. You can identify the examples of these websites by entering this search terms inurl: /proc/sef/cwd/
EXPOSED FTP SERVERS – Since File transfer protocols may also contain certain sensitive information and they are not normally meant to be exposed, you could use the Google dork written below to access these transfer protocols.
ENV FILES – Some website developers sometimes ignore the best practices and leave the .env files in a place that is publicly accessible. Certain Google Dorks are used to access these files and they often contain very sensitive information about site safety framework
NB: Env files are used to define configurations and variables for web development work spaces.
SSH PRIVATE KEYS – Certain information is shared on the SSH protocol and the keys used in this process are generally not meant to be disclosed. With the help of this Dork, you will be able to find some of these keys that have been filed into an index by Google.
EMAIL LISTS – These are unbelievably easy to find with Google dorks. Most spammers use this trick to add unlimited number of Email addresses to their spam list. To access email lists, here is a format of how your dork should appear like
LIVE CAMERAS – If you intend to monitor certain areas, Google dorking can help you locate and watch live cameras with no significant IP restrictions. Depending on how creative you can get, there are many Google Dorks that give you access to various live cameras globally including those of the military or the government. To access IP based Cams, here is the Dork [Inurl: top. Htm inurl: currenttime]. In a situation where you want to access webcam transmitted coverage, here is the dork
MP3, MP4, PDF – If you intend to download any files on the internet without accessing them through a streaming platform or an online library, you could use the Google dorks specified below
WEATHER DORKS – Weather dorks gives you access to any weather measuring device that is connected to the internet from anywhere around the globe. To get this information, here is the search query to enter
ZOOM BOMBS – Zoom bombs are dorks used to disrupt online video meetings inasmuch as URLs are distributed. To do this, here is the search query to enter
DATABASE DUMPS – What better way is there to get information if not from wrongly configured databases? Some SQL files have been wrongly dumped on servers and can be accessed through a domain. This leaves these database open to anyone with the right search term.
WORDPRESS ADMIN LOGIN – With the aid of a Google dork, it is very easy to find an index of word press administrative login pages and even access the login information of those pages.
APACHE 2 – Apache is an example of a server. Just like any other type of vulnerable web server, Apache 2 servers are can also be gotten through the right Google dork.
GOVERNMENT DOCUMENTS – These documents – although meant to be restricted from public view – are not very difficult to find with the help of Google dorks. To get these files, here is the dork query to enter
User –agent: *
Disallow: /
The disallow sub-column would contain any specific sort of directory you would like to block out.
Google dorks are the holy grail of Google search queries. They allow anyone to have access to any type of information given that he or she has the right search terms. Therefore, as an administrator, it is important that you take active measures to protect infiltration to your website by protecting it. On the other hand, you could also leverage on this knowledge to gain certain information that is useful to you in any field of professionalism.
Subscribe for the latest news