Google Dorking For Penetration Testing and Reconnaissance
Google Dorking For Penetration Testing and Reconnaissance
Google Dorking (Google Hacking) is a powerful technique for finding information on the web
that is not meant to be easily accessible. These can include files, admin panels, breach data,
and more. Below are some Google dorks and methods you can use to find specific types of
information.
To search for specific file types (e.g., .pdf, .doc, .xls, etc.), you can use the filetype:
operator.
Example Dorks:
If you are looking for breached credentials or sensitive information that might have been
leaked, you can use keywords combined with breach-related terms.
Example Dorks:
You can also search for files hosted in public repositories or directories:
Important Note: Searching for and using leaked credentials is illegal unless you have
explicit permission from the organization for penetration testing.
Admin panels are often the gateway for controlling a web application. They are frequently
misconfigured or poorly secured.
Example Dorks:
● inurl:admin/login.php
● inurl:admin/dashboard
● inurl:admin/index.php
● intitle:"admin panel" site:example.com
● intitle:"Admin Login" inurl:admin
● inurl:wp-admin (for WordPress admin panels)
Example Dorks:
While it's not ethical to use such websites for malicious purposes, here are some tools and
platforms that collect publicly available data for legal intelligence purposes:
● LinkedIn: You can find employee details by searching the company on LinkedIn and
filtering by employee roles.
● Hunter.io: Hunter.io allows you to search for domain-specific email addresses of
employees.
● Clearbit: Another tool to collect business contact information and personal email
addresses.
● RocketReach: Allows you to find employee emails, phone numbers, and LinkedIn
profiles.
These tools are often used for sales and marketing purposes but could be useful in recon
during red team operations or OSINT gathering.