Best 10 Google Dork List for Ethical Hackers


 Best 10 Google Dork List for Ethical Hacker 

1. Information Gathering:

  • intitle:"Index of" inurl:/ftp - Searches for publicly accessible FTP directories.
  • filetype:log inurl:"access.log" - Finds access logs on web servers.
  • site:example.com -www - Searches for subdomains of a website.
2. Vulnerability Scanning:
  • intitle:"Powered by phpMyAdmin" - Identifies servers running phpMyAdmin.
  • intext:"Web Application Assessment Report" filetype:pdf - Discovers publicly available security assessment reports.
3. Exposed Devices:
  • intitle:"Live View / - AXIS" - Searches for open AXIS camera feeds.
  • intitle:"index of" intext:"your server is running" - Finds the default page of web servers.
4. Files and Directories:
  • filetype:sql intext:password - Searches for SQL database dumps containing passwords.
  • ext:log "Software: Microsoft Internet Information Services" - Identifies IIS web server logs.
5. Sensitive Information Disclosure:
  • intext:"Index of /" +.htaccess - Lists .htaccess files that may contain sensitive information.
  • filetype:env intext:APP_ENV - Searches for environment files with application configurations.
6. Network Cameras:
  • intitle:"Network Camera NetworkCamera" - Searches for network cameras.
  • inurl:"/view/index.shtml" - Identifies network camera live streams.
7. Exposed Documents:
  • filetype:doc OR filetype:pdf site:example.com - Looks for documents on a specific website.
8. Exposed Services:
  • intitle:"index of" "SFTP on" - Finds servers running SFTP.
  • intitle:"index of" "Parent Directory" - Displays directories without an index file.
9. Login Pages:
  • intitle:"Login page" inurl:admin - Searches for login pages with "admin" in the URL.
  • intext:"Please log in" intitle:"Login" - Identifies login pages.
10. Exposed Source Code:
  • intext:"Index of /" +.git - Lists Git repositories that may expose source code.

Comments

Popular posts from this blog

How to become Cybersecurity Expert after 12th