What Is Google Dorking And How To Use It (2024)

Google has become synonymous with searching the web. Many of us use it on a daily basis but most regular users have no idea just how powerful its capabilities are. And you really, really should. Welcome to Google dorking.

What is Google Dorking?

Google dorking is basically just using advanced search syntax to reveal hidden information on public websites. It let’s you utilise Google to its full potential. It also works on other search engines like Google, Bing and Duck Duck Go.

This can be a good or very bad thing.

Google dorking can often reveal forgotten PDFs, documents and site pages that aren’t public facing but are still live and accessible if you know how to search for it.

For this reason, Google dorking can be used to reveal sensitive information that is available on public servers, such as email addresses, passwords, sensitive files and financial information. You can even find links to live security cameras that haven’t been password protected.

Google dorking is often used by journalists, security auditors and hackers.

Here’s an example. Let’s say I want to see what PDFs are live on a certain website. I can find that out by Googling:

filetype:pdf site:[Insert Site here]

Doing this with a company website recently revealed a weird genealogy relationship chart and a guide to amateur radio that had been uploaded to its servers by members at some point.

I also found another special interest PDF but won’t mention the topic as the document contained a person’s name, email address and phone number.

This is a great example of why Google Dorking can be so important for online security hygiene. It’s worth checking to make sure your personal information isn’t out there in a random PDF on a public site for anyone to grab.

It’s also an important lessons for companies and government organisations to learn – don’t store sensitive information on public facing sites and perhaps considering investing in penetration testing.

[related_content first=”1664260″]

You should probably be careful

There is nothing illegal about Google dorking. After all, you’re just using search terms. However, accessing and downloading certain documents – particularly from government sites – could be.

And don’t forget that unless you’re going to extra lengths to hide your online activity, it’s not hard for tech companies and the authorities to figure out who you are. So don’t do anything dodgy or illegal.

Instead, we recommend using Google dorking to assess your own online vulnerabilities. See what’s out there about you and use that to fix your own personal or company security.

And as a general rule — don’t be a dick. If you ever find sensitive information through any means, including Google dorking, do the right thing and let the company or individual know.

Best Google Dorking searches

Google dorking can get quite complex and specific. But if you’re just starting out and want to test this out for yourself for honourable reasons only, here are some really basic and common Google dorking searches:

  • intitle: this finds word/s in the title of a page. Eg – intitle: gizmodo
  • inurl: this finds the word/s in the url of a site. Eg – inurl: “apple” site: gizmodo.com.au
  • intext: this finds a word or phrase in a web page. Eg: intext: “apple” site: gizmodo.com.au

What Is Google Dorking And How To Use It (1)

  • allintext: this finds the word/s in the title of a page. Eg – allintext:contact site: gizmodo.com.au
  • filetype: this finds a specific file type, like PDF, docx, csv. Eg – filetype: pdf site: gov.au
  • Site: This restricts a search to a certain website like with some of the above examples. Eg – site:gizmodo.com.au filetype:pdf allintitle:confidential
  • Cache: This shows the cached copy of a site. Eg – cache: gizmodo.com.au

Now we have some of the basic operators, here are some useful searches you can do to check your own online security hygiene:

  • password filetype:[insert file type] site:[insert your website]
  • [Insert Your Name] filetype.pdf
  • [Insert Your Name] intext: [Insert a piece of personal information like your email address, home address or phone number]
  • password filetype:[Insert File Type, like PDF] site:[Insert your website]
  • IP: [insert your IP address]

The Cheapest NBN 50 Plans

It’s the most popular NBN speed in Australia for a reason. Here are the cheapest plans available.

At Gizmodo, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.

What Is Google Dorking And How To Use It (2024)

FAQs

How does Google dorking work? ›

Google dorkinging utilizes custom queries that use advanced search operators (specific symbols or words) to fetch you targeted search results. All you have to do is type in the custom Google dork query in the Google search bar.

Is Google Dork legal? ›

This strategy takes advantage of the features of Google's search algorithms to locate specific text strings within search results. Notably, while the term “hacking” suggests an illicit activity, Google Dorking is entirely legal and often used by security professionals to identify vulnerabilities in their systems.

What is an example of a Google Dork? ›

A: Popular Google Dorks include site:, intext:, inurl:, filetype:, and intitle:. These operators can be used to search for specific file types or content within a website.

What are the benefits of Google dorks? ›

Easily Fetch Sensitive Data: Google Dorking can easily find hidden information on websites like usernames & passwords, email lists, and some sensitive data such as bank account details, transaction details, etc. Flaw Detection is Easy: It is used to find vulnerabilities in the website.

What are the disadvantages of Google Dorks? ›

Attackers get a significant amount of information through Google dorks that they would not have with straightforward searches. This data consists of the following: Passwords and usernames. Sensitive email addresses.

How is Google dorking used by hackers? ›

Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results. The Google search engine works similarly to an interpreter using search strings and operators.

What is not allowed to search on Google? ›

We don't allow content that could directly facilitate serious and immediate harm to people or animals. This includes, but isn't limited to, dangerous goods, services or activities, and self-harm, such as mutilation, eating disorders, or drug abuse.

Why is it called Google dorking? ›

Google dorking, also known as Google hacking, can return information difficult to locate through simple search queries. This includes information not intended for public viewing, but that is inadequately protected and can, therefore, be "dorked" by a hacker.

What is footprinting using Google Dorks? ›

Google Hacking/Google Dorks

This is a process of creating search queries to extract hidden information by using Google operators to search specific strings of text inside the search results.

What does Google Dorks mean? ›

Google can help us find exposed files, scripts and other critical resources in web applications. To find this type of sensitive information, hackers use specific search terms in Google. We call them Google Dorks.

What is Google Dorks for vulnerable websites? ›

By combining specific search operators with targeted keywords, you can refine your search to find specific types of information or uncover potential vulnerabilities on websites. The purpose of Google Dorks is primarily related to information retrieval, vulnerability assessment, and security testing.

How much does Google pay for hackers? ›

The estimated total pay range for a Ethical Hacker at Google is ₹8L–₹60.0L per year, which includes base salary and additional pay. The average Ethical Hacker base salary at Google is ₹30.7L per year. The average additional pay is ₹0 per year, which could include cash bonus, stock, commission, profit sharing or tips.

Top Articles
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 6315

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.