Category
Threat Intelligence
Level
Basics
Number
82
Google Dorks are specialized search queries designed to find specific information on websites.
These dorks are prewritten or you can make your own based on a specific search needs and utilize special syntax for extracting data using filters available in the GHDB (Google Hacking Database).
Some examples of Google Dorks queries include:
site:wikipedia.org
: Limits search results to the Wikipedia website.intitle:"Index of /images"
: Finds web pages with "Index of /images" in their title.inurl:login
: Searches for URLs containing the word "login."filetype:doc
: Searches for Microsoft Word documents.
Information Gathering Websites:
Wayback Machine
: An internet archive tool offering historical snapshots of web pages.- Website: https://web.archive.org/
OSINT Framework
: A tool to gather information from free resources and discover OSINT resources.- Website: https://osintframework.com/
Shodan
: A search engine scanning internet-connected devices for open ports, services, and vulnerabilities.- Website: https://www.shodan.io/
Google Dork Defense Techniques:
- Detecting attackers using search engines for info is challenging; adopting similar search techniques can reveal critical exposed data.
- Minimize information exposure through search engines to enhance organizational security.
Summary:
- Google Dorks use special search queries to extract specific data from websites via the GHDB.
- Tools like Wayback Machine, OSINT Framework, and Shodan aid in gathering web and device intelligence.
- Organizations must limit information exposure online to enhance security against potential threats.