- Google Dorks List and Updated Database in 2023 (Box Piper)
Google search operators
- https://www.exploit-db.com/google-hacking-database/
- http://www.googleguide.com/advanced_operators_reference.html
Google Search for Reconnaissance
| Information obtained | Google Search |
| Sub-domains (see sublistr3) | site:”domain.com” -site:”www.domain.com” |
| Confidential documents | site:”domain.com” (“do not distribute” | “internal use only” | “confidential”) (ext:pdf | ext:doc | ext:docx | ext:rtf | ext:ppt | ext:pptx | ext:odt | ext:sxw | ext:psw | ext:pps | ext:csv) |
| All publicly exposed documents | site:”domain.com” ext:doc | ext:docx | ext:odt | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv |
| Powerpoint files from a site | site:”domain.com” filetype:ppt |
| Email addresses from a domain | “@domain.com” |
| Passwords in Pastebin | site:”pastebin.com” “domain.com” |
| Search GitHub & GitLab | site:github.com | site:gitlab.com “domain.com” |
| Search StackOverflow | site:stackoverflow.com “domain.com” |
| Info that google stores about the page itself | info:”domain.com” |
| No HTML Files | site:domain.com -filetype:html |
| Technologies | inurl:domain.com “powered by” |
Programming languages
| Java Server Pages | ext:jsp |
| Coldfusion | ext:cfm |
| Perl | ext:pl |
| PHP | ext:php |
Files & Configurations
Databases
Exploits
firefox --search "Wordpress site:exploit-db.com"
Other searches
# Look for salary files
"payroll salary" filetype:xls
# searched through google cache
cache: URL [string]
# display info that google stores about the page itself
info:domain.com
In Google Search - View cached version of page
cache:domain.com
#-------------------------------------------------------------------------------
# Examples (vulnerable sites)
#-------------------------------------------------------------------------------
# Exposed Frontpage credentials
"# -FrontPage-" filetype:pwd inurl:(service | authors | administrators | users)
intitle:"VNC viewer for Java"
Devices
# Mobotix cameras connected on the internet, User name: admin, Default Password: meinsm
inurl:"/Control/UserImage.html"
# AXIS Cameras
inurl:/view/index.shtml
# Cameras
intitle:"netbotz appliance" "OK" -filetype:pdf
# Router
intitle:"SpeedStream Router Management Interface"
# Web accessible, open cisco routers
inurl:"level/15/exec/-/show"