google hacking vcl
google hacking vcl
GOOGLE HACKING
Dipanshu Parashar
Founder
Google Hacking
Google hacking refers to art of reading complex search engine queries. Google has developed a few
search parameters in order to improve targeted search. But they are abused by hackers to search for
information and websites that are vulnerable to a numerous exploits and vulnerabilities and using which
a hacker may be able to gather some very interesting information, including passwords, and discovering
pages containing login portals, space containing network, advisories, vulnerable software, finding files,
and directories that shouldn’t be visible.
This can be accomplished with Google hacking database (GHDB) also called Database of queries to
identify sensitive data and Google operator can help finding required info by avoiding irrelevant data
and using advanced Google operators, attackers can locate specific string of text, specific version of
vulnerable applications.
https://www.exploit-db.com/google-hacking-database/
Google Dork
Queries
Above screen shot shows different categories containing different Google dorks
HOW A GOOGLE SEARCH WORK
Google has a network of linked computers that work together to provide the user with the best
search results possible.
• Web servers
GOOGLE USER QUERY GOOGLE WEB SERVER
• Web spiders
• Index servers
DOC SERVERS
INDEX SERVICES
• Doc servers
Google’s web spiders crawl and cache the internet. The crawl is indexed using Google’s
patented Page Rank technology, which determines the importance of each page.
PageRank is a link analysis algorithm and it assigns a numerical weighting to each element of
a hyperlinked set of documents, such as the World Wide Web. In simple words it is a voting
system. The more pages that link to you, the higher rank you receive. PageRank takes the votes
and determine the actual ranking of each page using an advanced proprietary algorithm. When
search results are displayed, the higher ranking pages are displayed at the top of the page.
TITLE
URL
DESCRIPTION
WHEN SEARCHING GOOGLE FOR ANYTHING, GOOGLE GIVES 10 RESULTS IN EVERY PAGE AND IN EVERY 10
RESULTS THERE IS 3 INFORMATION BLUE-> TITLE, GREEN-> URL, BLACK -> DESCRIPTION.
HOW GOOGLE SEARCH IS USED FOR HACKING
Google allows the use of certain operators to help refine searches. The use of
advanced operators is very simple as long as attention is given to the syntax. The
basic format is:
operator:search_term
• Search for confidential Excel spreadsheets the company inadvertently posted online
by typing into Google search
• Command to exploit misconfigured web servers that list the contents of directories
not intended to be on the web
So these are just very few of the dorks that I mentioned here. GHDB is
so full of dorks which can be used for various other purposes.
Google dork query is a search string that uses advanced search operators to find
information that is not readily available on a website.
Google dork queries are used by IT officers, Security administrators and hackers. Security
administrators use it in order to find vulnerability in their websites or server. Queries can be
used as some sort of security tools but hackers can used them for finding vulnerabilities in a
server or website.
Example: $50…$100 it will only show results with value 50 and 100 in
it.
link: search webpages having a link to a specific URL
Basic syntax-> link:url
For example -> link:alibaba.com
Filetype: search only within files with specific extensions.
Basic syntax-> Filetype:search_term.extension type
Example-> Filetype: cooking.pdf will show only those results for pdf file related
with cooking.
Example-> filetype: clients.xls will show only those results xls file (excel
document) related with clients.
Inurl: find sites containing search term in the URL of the page
STEP: 1 Open Google and type inurl:php?id=1. Random url with php?id=1 will
appear as a result.
In case a particular country’s websites is to be found so in that case type
inurl:php?id=1 site:uk. Site:uk operator will show results with.uk as extension
only
STEP2: Select a target website for finding vulnerability.
TERGET
WEBSITE
Normal website
Clearly it can be seen that website is vulnerable and using sql injection techniques an attacker
can proceed further and do much more.
Vulnerable column
Using vulnerable columns an attacker can find database name and can get into
database easily and see or steal information stored there.
Finding Directory listings
Directory listing: Directory listing is a web server function that displays a
list of all the files when there is not an index file, such as index.php and
default.asp in a specific website directory.
Using dork
Inurl:music
Intitle:index of
Site:us
So this is how dorks can be used to get into directory of such websites which
have misconfigured web servers or have directory listing vulnerability
USING DORKS AVAILABLE ON GOOGLE HACKING DATABASE TO GET
NETWORK CCTV CAMERAS
STEP2: Clicking the dork link will take you to next page of GHDB.
So this is how using GHDB is used for getting security camera and
much more can be done using dorks available on GHDB.