Jump to content

Google hacking

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by GermanJoe (talk | contribs) at 09:26, 25 June 2020 (rvt - test edits). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Google hacking, also named Google dorking,[1][2] is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use.

Basics

"Google hacking" involves using advanced operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. A search query with intitle:admbook intitle:Fversion filetype:php would locate all web pages that have that particular text contained within them. It is normal for default installations of applications to include their running version in every page they serve, for example, "Powered by XOOPS 2.2.3 Final".

Devices connected to the Internet can be found. A search string such as inurl:"ViewerFrame?Mode=" will find public web cameras.

Another useful search is following intitle:index.of followed by a search keyword. This can give a list of files on the servers. For example, intitle:index.of mp3 will give all the MP3 files available on various types of servers.

Advanced operators

There are many similar advanced operators which can be used to exploit insecure websites:

Operator Purpose Mixes with Other Operators? Can be used Alone? Web Images Groups News
intitle Search page Title yes yes yes yes yes yes
allintitle[3] Search page title yes yes yes yes yes yes
inurl Search URL yes yes no yes completely like intitle
allinurl Search URL yes yes yes yes yes like intitle
filetype/ext specific files yes yes yes yes completely
intext Search text of page only yes yes yes yes yes yes
allintext Search text of page only yes yes yes yes no
site Search specific site yes yes no yes yes completely
link Search for links to pages yes yes yes yes yes completely
inanchor Search link anchor text yes yes yes yes completely yes
numrange Locate number yes yes yes yes yes completely
daterange Search in date range yes yes yes completely completely completely
author Group author search yes yes yes yes yes completely
group Group name search yes yes yes yes completely
insubject Group subject search yes yes like intitle like intitle yes like intitle
msgid Group msgid search yes yes completely yes

History of Google hacking

The concept of "Google hacking" dates back to 2002, when Johnny Long began to collect Google search queries that uncovered vulnerable systems and/or sensitive information disclosures – labeling them googleDorks.[4]

The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database (GHDB) in 2004.[5][6]

Since its heyday[when?], the concepts explored in Google hacking have been extended to other search engines, such as Bing[7] and Shodan.[8] Automated attack tools[9] use custom search dictionaries to find vulnerable systems and sensitive information disclosures in public systems that have been indexed by search engines.[10]

References

  1. ^ Term Of The Day: Google Dorking - Business Insider
  2. ^ Google dork query, techtarget.com
  3. ^ Karch, Marziah. "Allintitle Definition". About.com. About.com. Retrieved 29 February 2020.
  4. ^ "googleDorks created by Johnny Long". Johnny Long. Archived from the original on 8 December 2002. Retrieved 8 December 2002.
  5. ^ "Google Hacking Database (GHDB) in 2004". Johnny Long. Archived from the original on 7 July 2007. Retrieved 5 October 2004.
  6. ^ "Google Hacking for Penetration Testers, Volume 1". Johnny Long. Retrieved 20 February 2005.
  7. ^ "Bing Hacking Database (BHDB) v2". Bishop Fox. Retrieved 27 August 2014.
  8. ^ "Shodan Hacking Database (SHDB) - Part of SearchDiggity tool suite". Bishop Fox. Retrieved 21 June 2013.
  9. ^ "SearchDiggity - Search Engine Attack Tool Suite". Bishop Fox. Retrieved 27 August 2014.
  10. ^ "Google Hacking History". Bishop Fox. Retrieved 27 August 2014.