To use a Google Dork, you simply type in a Dork into the search box on Google and press “Enter”. Here are some of the best Google Dork queries that you can use to search for information on Google.
Scraper API provides a proxy service designed for web scraping. With over 20 million residential IPs across 12 countries, as well as software that can handle JavaScript rendering and solving CAPTCHAs, you can quickly complete large scraping jobs without ever having to worry about being blocked by any servers.
intitle:"index of" "application.properties"
ext:(doc | pdf | xls | txt |) (intext:confidential salary) inurl:confidential
filetype:log inurl:paypal
ext:xlsx inurl:database
intitle:final.attendee.list | inurl:final.attendee.list
inurl:https://trello.com AND intext:@gmail.com AND intext:password
intitle:"index of" intext:"apikey.txt
allintext:@gmail.com filetype:log
site:ftp.*.*.* "ComputerName=" + "[Unattended] UnattendMode"
inurl:"/php/info.php" "PHP Version"
"The SQL command completed successfully." ext:txt | ext:log
ext:yml | ext:txt | ext:env "Database Connection Information Database server ="
intitle:"index of" intext:"web.xml"
ext:php intitle:phpinfo "published by the PHP Group"
"putty.log" ext:log | ext:cfg | ext:txt | ext:sql | ext:env
ext:txt | ext:log | ext:cfg "Building configuration..."
ext:sql | ext:txt intext:"-- phpMyAdmin SQL Dump --" + intext:"admin"
"secret_key_base:" ext:exs | ext:txt | ext:env | ext:cfg
intitle:"index of" "Clientaccesspolicy.xml"
site:gov ext:sql | ext:dbf | ext:mdb
intitle:"index of" intext:credentials
Index of /_vti_pvt +"*.pwd"
intitle:"index of" "/.idea"
intitle:"index of" "service-Account-Credentials.json" | "creds.json"
"-- Server version" "-- MySQL Administrator dump 1.4" ext:sql
intitle:"index of" "/xampp/htdocs" | "C:/xampp/htdocs/"
site:*gov.* intitle:index.of db
"* Authentication Unique Keys and Salts" ext:txt | ext:log
allintext:"Index Of" "cookies.txt"
ext:txt | ext:log | ext:cfg | ext:yml "administrator:500:"
"index of" "/home/000~ROOT~000/etc"
intitle:"PowerMTA" inurl:logs
allintext:"index of" "oauth-private.key"
"UV9 Error (1.0)"
intitle:"Environment Variables" inurl:/cgi-bin/
intitle:"index of" "mysql.log" | "mysql.logs"
"putty.log" ext:log | ext:cfg | ext:txt
intitle:"index of" "config.db"
intitle:"index of" "phpmyadmin.sql"
Database:phpmyadmin intext:mysql ext:sql inurl:phpmyadmin
'AUTH_SALT' | 'SECURE_AUTH_SALT' | 'LOGGED_IN_SALT' | 'NONCE_SALT' ext:txt | ext:cfg | ext:env | ext:ini
intitle:"index of" "composer.lock"
"index of" "callback.php"
site:ftp://ftp.*.* ext:sql
intext:admin ext:sql inurl:admin
ext:log intext:NetworkManager "systemd"
"index of" "user.MYD"
allintext:"API_SECRET*" ext:env | ext:yml
"Reflector Dashboard" inurl:/db/index.php/
intitle:"index of" jboss-service.xml
intext:ISUR_MACHINE IIS -log
allintext:username,password filetype:log
intitle:"index of" exception.log
intitle:"report" ("OpenVAS" | "Nikto") ext:pdf OR ext:html
intitle:"report" ("Fortify" | "Web Inspect") filetype:pdf
intitle:"Index of /" "joomla/database"
intitle:"report" ("qualys" | "acunetix" | "nessus" | "netsparker" | "nmap") filetype:html
intitle:"index of" ./bash_history
"Index of" "accounts.sql"
"-----BEGIN RSA PRIVATE KEY-----" inurl:id_rsa
intitle:"index of" "bundle.pem"
intitle:"index of" "*named.root.key"
intitle:"index of" /etc/openvpn/
Index of /__MACOSX/System
intitle:"index of" "id_rsa.pub"
intext:"Not to be distributed" ext:doc OR ext:pdf OR ext:xls OR ext:xlsx
"Index of" "/access"
index of /backend/prod/config
intitle:"index of /" "*key.pem"
"index of" "siri"
intext:"index of /" "*.yaml"
intitle:"index of" secrets.yml
intitle:"index of" admin.tar
index of .svn/text-base/index.php.svn-base
intext:"index of /" "config.json"
"index of sqlite"
intitle:index.of.?.db
"Index of" "customer.php"
intitle:"index of /" "nginx.conf"
index of "logs.zip"
"root.log" ext:log
intitle:"index of" "dev/config"
index of "dbbackup"
inurl:admin intitle:index of ext:sql | xls | xml | json | csv
DORK : intext:"index of" "var/log/"
"microsoft internet information services" ext:log
"phpMyAdmin MySQL-Dump" "INSERT INTO" -"the"
intitle:"index of" "wp-admin.zip"
index of "backup.zip"
intitle:"index of" "adminsubscribeack.txt"
"index of" /ftp/logs
inurl:.drone.yml intext:git config user.email
intitle:"index of" "security.php"
index.of:"pcap" -site:stackoverflow.com -site:github.com
intitle:"index of" "var/log/"
intitle:index of config.asp
intitle:"index of" "aws-config.php"
"index of" "sshd_config"
"index of" /private/logs
"index of" "user.sqlite"
inurl:"ReportServer/Pages/ReportViewer.aspx"
intitle:"index of" "auth.config"
intitle:"index of" "auth_config.php"
intitle:"index of" "log.bak"
filetype:sql intext: "sql dump"
intitle:"index of" "database/config"
allinurl:index.php?db=information_schema
intitle:"index of" ".config"
ext:sql intext:"-- phpMyAdmin SQL Dump
intitle:"index of" "properties.ini"
intitle:"index of" "db.log"
intext:"W E L C O M E to R O O T" ext:cfg OR ext:log OR ext:txt
intitle:"index of" "userdata.json"
intitle:"index of " "users.json"
intitle:"index of" "wpadmin-secure.htaccess"
intitle:"index of" "privkey.pem"
intitle:"index of" "dhparams.pem"
intitle:"index of" "token.txt"
intitle:"index of" "*root.pem"
intitle:"index of" "refresh_token.txt" OR "access_token.txt" OR "jsapi_ticket.txt"
A Google Dork is a search query that looks for specific information on Google’s search engine. Google Dorks are developed and published by hackers and are often used in “Google Hacking”.
Google Dorks are extremely powerful. They allow you to search for a wide variety of information on the internet and can be used to find information that you didn’t even know existed.
Because of the power of Google Dorks, they are often used by hackers to find information about their victims or to find information that can be used to exploit vulnerabilities in websites and web applications.
Google Search Engine is designed to crawl anything over the internet and this helps us to find images, text, videos, news and plethora of information sources. With it’s tremendous capability to crawl, it indexes data along the way, which also includes sensitive information like email addresses, login credentials, sensitive files, website vulnerabilities, and even financial information. In many cases, We
as a user won’t be even aware of it.
cache:
link:
related:
info:
define:
stocks:
site:
allintitle:
intitle:
allinurl:
inurl:
Google search service is never intended to gain unauthorised access of data but nothing can be done if we ourselves kept data in the open and do not follow proper security mechanisms.
Essentially emails, username, passwords, financial data and etc. shouldn’t be available in public until and unless it’s meant to be. Example, our details with the bank are never expected to be available in a google search. But our social media details are available in public because we ourselves allowed it.
Google Search is very useful as well as equally harmful at the same time. Because it indexes everything available over the web.
You need to follow proper security mechanisms and prevent systems to expose sensitive data. Follow OWASP, it provides standard awareness document for developers and web application security.
Scraper API provides a proxy service designed for web scraping. With over 20 million residential IPs across 12 countries, as well as software that can handle JavaScript rendering and solving CAPTCHAs, you can quickly complete large scraping jobs without ever having to worry about being blocked by any servers.
Note: By no means Box Piper supports hacking. This article is written to provide relevant information only. Always adhering to Data Privacy and Security.