Contact Us Today 01642 716680

What is Google Dorking

In this post, we learn how Cyber Security Professionals use Google's advanced search operators to find useful information.

If the name doesn’t already sound strange enough, wait until you see what you can do with Google Dorking.  Before we dive deep into how we can use Google Dorking.  We must first look at search engines themselves.

What is a search engine?

A search engine can be thought of as a behemothic database, however, it is far more sophisticated than that. A search engine will return a list of results that are the most relevant to the user’s search.  On the Internet nowadays, there are a plethora of search engines, each with its unique set of capabilities and features. Google is by far the most popular search engine, although several other search engines exist that answer billions of user queries worldwide.  DuckDuckgo, Bing, Baidu just to name a few.

How does a search engine work?

Many search engines present the results based on their importance because huge search engines include millions, if not billions, of pages. Various algorithms are routinely used to determine this relevance.

Search engines work by crawling (also known as spidering) a page, then processing the contained data. These days that involves complex processing, which is not surprising considering the vastness of the internet in 2021.  The data will be processed and analysed to strip out content, keywords, and other data which the search engine deems relevant.

Google Dorking

Now we have learned a little about search engines, let’s take a look at Google Dorking. But what is it exactly?  Google Dorking is essentially a searching strategy that allows hackers to easily acquire access to data that businesses or individuals did not intend to make public. TLDR: “Google Dorking is essentially a useful hacking shortcut for locating systems and data of interest.”

Okay, let’s jump into some Google Dorking commands. We will keep it simple to start with.

Using quotation marks – “something”

We can use quotation marks to limit down our search query, for example. Everything between these quotation marks will be interpreted as exact by Google, and it will only provide results for the exact term entered. This is the most basic example of Google Dorking that can be achieved.

The picture shows the result from searching with quotation marks on Google.

Okay great. we have some pictures of cats. Let’s move on to some more interesting Google Dorking commands. 

Using the “site:” operator

We can use the site operator to narrow down our query to only the website we specify. Using this Google Dorking command, we should only see the site queried alongside any other words we specify after the command. Let’s look at an example of this Google Dork.

Query - passwords
The picture shows the result of using the “site:” operator on Google.

Fantastic, we have a more interesting result than our previous cat images.

Using the site: and intext: operators.

The site operator is great and all. But using it alongside ‘intext:‘ will reveal more juicy information. What does ‘intext:’  do exactly? Intext will search the web page content for whatever you type in.

Query - intext:"SECRET_KEY="
The picture shows the result of using the “intext:” and “site:” operators on Google.

Great stuff,  we have told google to find all indexed pages on and return all items which contain the text “SECRET_KEY“. Using a google dork.

Google Hacking Database

It’s not possible to write a blog post about Google Dorking without mentioning the Google Hacking Database. This database has been compiled for several years by security professionals who take their Google Dorking seriously.

The picture shows the Google Hacking Database (GHDB)

As of this writing, there are 7,064 google dorks in the Google Hacking Database. Which is more than enough for any Google Dorking enthusiast. The Google Hacking Database can be filtered to search for very specific dorks.  It lists several categories, “Vulnerable Files“, “Web Sever Detection“,  “Files Containing Juicy Information” just to name a few.

Google Dork Commands

siteWill display a complete list of all indexed URLs for the supplied domain and
allintitleWill only show pages with titles that contain X characters.allintitle: “Security  Beyond Compliance”
allinurlWill only display results that have all of the provided characters in their URL.allinurl:sencode
filetypeUsed to find any type of file extension; for example, if you wanted to find our ‘Owasp Top 10  Flash Cards‘.filetype:pdf  owasp top 10 flash cards
inurlThis is identical to allinurl, however it is only usable for one term, such as inurlinurl:sencode
intitleThis operator will only return keywords inside the title.intitle:sencode
inanchorWill only return exact anchor text used on any links.inanchor:”web  application penetration testing”
intextWill only return pages which contain certain  characters or strings inside their textintext:”Owasp Top 10 Flash Cards”

Who uses Google Dorking?

Google Dorking is frequently used by computer security experts, cyber criminals and researchers. It is also used during the reconnaissance phase of penetration testing.

Frequently Asked Questions

What is Google Dorking?

Google Dorking is a search tactic that makes it simple for hackers to gain access to information that organisations or individuals did not intend to make public. It’s a handy hacking shortcut for locating relevant systems and data.

Is it illegal to use Google Dorking?

Different laws apply depending on where you are in the world. Using Google Dorking is probably not against the law, but accessing the URL behind that indexed page might be. When you click one of the links, you’ll be taken to a resource that may or may not have been made intentionally available. Local laws that apply to that system may record and/or protect the action.