GOOGLE HACKING DATABASE:
Well Google Hacking database doesn’t mean like one can hack google, it actually means that one can filter his/her search query with the help of google.
We all know that Google is the best thing ever happened to Internet.The information stored at google data center are enormous. We are typing whatever the word we want to type and walllaaahhh..we are getting results.
Being a Penetration Tester, we can use google for intelligent Information gathering…i.e Extracting the sensitive information of our target.
Here I am going to share top 10 google dorks used by security guys.
LET’S PLAY WITH GOOGLE:)
If you include other words in the query, Google will highlight those words within the cached document.
[link:] will list webpages that have links to the specified webpage.We can access the linked website of our target.
It will list web pages that are “similar” to a specified web page.
You will get website similar to facebook.
Google will restrict the results to those websites in the given domain.
If you include [intitle:] in your query, Google will restrict the results to documents containing that word in the title.
If you include [inurl:] in your query, Google will restrict the results to documents containing that word in the url.
The query [info:] will present some information that Google has about that web page.
If you start a query with [allinurl:], Google will restrict the results to those with all of the query words in the url.
The query [define:] will provide a definition of the words you enter after it, gathered from various online sources.
If you begin a query with the [stocks:] operator, Google will treat the rest of the query terms as stock ticker symbols, and will link to a page showing stock information for those symbols.
Just by Googling you can get plethora of Dorks too.
Note:This Tutorial is for Educational Purpose Only..!!