Google is more powerful than most people realize. By using advanced search operators—also known as Google Dorking or Google Hacking—hackers, penetration testers, and cybersecurity researchers can find sensitive information, security vulnerabilities, and misconfigured websites indexed by Google.
This guide will walk you through the basics of Google Dorking, common search operators, and how to use them effectively.
1. What is Google Dorking?
Google Dorking is a technique that utilizes Google’s advanced search features to refine search results and uncover valuable information. It is often used in open-source intelligence (OSINT) gathering, penetration testing, and even by everyday users looking for specific information efficiently.
⚠ Legal Disclaimer
Google Dorking itself is not illegal, but using it to access or exploit private information without permission can be illegal. Only use these techniques for ethical hacking, penetration testing, or research on systems you have explicit permission to test.
2. Getting Started: Essential Google Dorks
Google Dorks are built using special search operators that help filter search results. Below are some of the most powerful operators and how to use them.
2.1. Restricting Searches to a Specific Website
To search only within a specific domain:
site:example.com
✅ Example:
Search for all pages on walmart.com:
site:walmart.com
2.2. Finding Specific File Types
To search for specific file extensions like PDFs, Word documents, log files, and spreadsheets:
filetype:pdf
ext:log
✅ Example:
Search for log files:
filetype:log OR ext:log
✅ Example:
Search for PDF files on Walmart’s website:
site:walmart.com filetype:pdf
2.3. Searching Through Social Media
Use the @
symbol to search for keywords on social media platforms like YouTube, Facebook, Twitter, and Reddit.
✅ Example:
Search YouTube for “Cyber Ryion”:
@youtube cyber ryion
3. Finding Sensitive Information
Hackers use Google Dorks to locate login pages, admin panels, and confidential files. Here are some useful techniques:
3.1. Finding Login Pages
To search for login pages or admin portals:
inurl:admin OR inurl:login
✅ Example:
Find login pages for Cisco.com:
site:cisco.com inurl:login
✅ Example:
Find PHP-based login pages:
inurl:login.php
3.2. Searching for Indexed Passwords and Config Files
Some websites accidentally expose sensitive files, such as password lists and configuration files.
✅ Example:
Search for password files:
intext:password filetype:txt
✅ Example:
Look for database configuration files:
inurl:config filetype:xml OR filetype:json
4. Discovering Websites That Link to a Target
To find other websites linking to a specific domain:
link:target.com -site:target.com
✅ Example:
Find all external websites linking to Target.com:
link:target.com -site:target.com
5. Advanced Search Operators for Google Hacking
Google allows you to combine multiple search operators to refine results.
5.1. Using AND to Combine Filters
To search for pages that must contain multiple terms, use AND
.
✅ Example:
Search example.com for pages with “admin” in the URL and “login” in the title:
site:example.com inurl:admin AND intitle:login
5.2. Using OR for Multiple Search Terms
To search for either one term or another, use OR
.
✅ Example:
Find pages with either “admin” or “login”:
site:example.com inurl:admin OR inurl:login
5.3. Using Parentheses for Grouping
Parentheses help group search filters logically.
✅ Example:
Search for login pages that use either PHP or ASP:
site:example.com (inurl:login.php OR inurl:login.asp)
5.4. Using the Minus (-) Operator to Exclude Terms
To remove unwanted results, use -
.
✅ Example:
Find websites that link to Target.com, but exclude target.com itself:
link:target.com -site:target.com
5.5. Using Quotes for Exact Matches
To search for exact phrases, enclose them in quotes.
✅ Example:
Search for the phrase “terms of service”:
intext:"terms of service"
6. Viewing Cached Versions of Websites
Google stores cached versions of web pages, which can be accessed using:
cache:example.com
✅ Example:
View an older version of example.com:
cache:example.com
7. Finding Pre-Made Google Dorks
If you’re unsure which dorks to use, check out Exploit-DB’s Google Hacking Database (GHDB). This resource contains thousands of tested Google Dorks for penetration testing.
🔗 Visit: Exploit-DB Google Hacking Database
✅ Example Google Dorks from GHDB:
- Find OpenSSH private keys on GitHub:
site:github.com "BEGIN RSA PRIVATE KEY"
- Find invoices in URLs:
inurl:invoice
Conclusion
Google Dorking is a powerful tool for finding vulnerabilities, researching cybersecurity risks, and gathering intelligence. While it is widely used for ethical hacking and penetration testing, it can also be used maliciously if employed improperly.
⚠ Always ensure you have permission before using these techniques on any website. Misuse could lead to legal consequences.