Google Dorks – Advanced information gathering techniques

इस आर्टिकल को अपनी भाषा में पढने के लिए, दिए आप्शन से अपनी भाषा चुनें !

Hello dear readers! Welcome back to my blog and I hope you do not forget to comment your views on my awesome articles. Today I will be describing about the really advanced techniques for gathering information using Google Search Engine. At the end I will be also providing you some good Google Dorks List that you can use right after scrolling this article.

What is Google Dorks?

Google dorks is a way of filtering Google's search results. Here Dorks are referred to as queries or phrases that helps us find the specific search results by focusing on our target. It is one of the best information gathering hacks that you can do from anywhere around the world anytime. You can even perform this information gathering process from your mobile browser, all you need is the access to Google.com

How does Google Dorks work?

Google Search Engine tracks its users i.e., 90% of the world's internet users & stores their data to further improvise its specially designed AI based search technology for throwing ads. For this process Google has designed Crawlers & Spiders. No! They are not real spiders with 6 legs or zombies that crawl. Crawlers & Spiders the bots built by Google for visiting every possible URL present on internet to gather their website information for its AI analysis. That's what a hacker actually need. Yes! Google Dorks are some Keys to that information which help us find the related values to our search targets. i.e., Google has almost all the list of hosted files, data & directories on a web server as it is not possible for developers to invest time in checking every directory & securing it from Google's bots. In this article we are going to learn about the important syntax that get us useful data from Google's Stores Information.

Let's get started!

To begin with this Google hack or advanced searching process we must know that this is just for your knowledge and educational use. We are not liable for any malicious act done online by the readers with the use of this search techniques for hacking purposes.

Google Dorks Commands / Google Dorks List

  • site:
    • "site:" is a parameter that can be used for filtering Google search results that includes a specific domain. It may be used as mentioned below.
    • Example usage - site:somedomain.com
  • inurl:
    • "inurl:" is a parameter that can be used for filtering specific phrases that are included in url of similar sites. It may be used as mentioned below.
    • Example usage - inurl"hollywood movies"
  • intitle:
    • "intitle:" is a parameter that can be used for filtering specific phrases that are included in title of Google search results. It may be used as mentioned below.
    • Example usage - intitle"Hackers in Raipur"
  • filetype:
    • "filetype:" is a parameter that can be used for filtering specific files extensions that are present on internet and are carwled by Google search bots. It may be used as mentioned below.
    • Example usage - filetype:pdf
  • intext:
    • "intext:" is a parameter that can be used for filtering specific phrases that are included in text areas websites crawled by Google search bots. It may be used as mentioned below.
    • Example usage - intitle"Hackers in Raipur"

Google dorks cheat sheet

  • Google Dorks list for getting movies direct download link. (Use dots instead of spaces in movie names)
    • intitle"index of/" (mp4|avi|mkv|mov) "iron.man"
    • intitle"index of/" inurl"dubbed"
    • intitle"index of/" inurl"2020" "movies"
  • Google Dorks list for getting software direct download link. (Use dots instead of spaces in software names)
    • intitle"index of/" (exe|rar|zip|dmg) "portable.photoshop"
  • Google Dorks list for getting excel files direct download link.
    • site:*.com filetype:xls intext"phone"
    • site:*.com filetype:xls intext"address"

You can simply gather data by targeting a specific domain name & list out all available subdomain, files, directories & even confidential credentials. It is just really bad idea to use your servers as a storage devices for personal files. If you are good in building logic & patterns, you can do wonders with above given Google dorks and commands.

Support us by subscribing YouTube channel: https://www.youtube.com/channel/UCexzlOktEQe-5S2A99lVTQg

Comment below and let us know what you want to learn in our upcoming cyber security articles.

Share with friends:

Leave a Comment

Your email address will not be published. Required fields are marked *