{"id":421,"date":"2022-01-09T10:11:13","date_gmt":"2022-01-09T09:11:13","guid":{"rendered":"https:\/\/wp.catedu.es\/zgzsur\/?p=421"},"modified":"2022-01-09T10:11:13","modified_gmt":"2022-01-09T09:11:13","slug":"specific-google-search","status":"publish","type":"post","link":"https:\/\/wp.catedu.es\/zgzsur\/specific-google-search\/","title":{"rendered":"Specific Google Search"},"content":{"rendered":"\n<div class=\"twitter-share\"><a href=\"https:\/\/twitter.com\/intent\/tweet?via=cpizaragozasur\" class=\"twitter-share-button\" data-size=\"large\">Twittear<\/a><\/div>\n<div class=\"_1AZWZ\">\n<div class=\"_1KJEZ _1Zljb\" tabindex=\"-1\" data-hook=\"post-title\">\n<h1 class=\"_2zPFV _3hhFM blog-post-title-font blog-post-title-color blog-text-color post-title blog-hover-container-element-color _3DFPj blog-post-page-title-font\" data-hook=\"post-title\"><span class=\"post-title__text blog-post-title-font blog-post-title-color\"><span class=\"blog-post-title-font blog-post-title-color\">Specific Google Search\u00a0 <\/span><\/span><\/h1>\n<h3 class=\"_2zPFV _3hhFM blog-post-title-font blog-post-title-color blog-text-color post-title blog-hover-container-element-color _3DFPj blog-post-page-title-font\" data-hook=\"post-title\"><span class=\"post-title__text blog-post-title-font blog-post-title-color\"><span class=\"blog-post-title-font blog-post-title-color\"><a href=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\">(cc2 Hackers arise)<\/a><br \/>\n<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div class=\"_6SyeS\" data-hook=\"post-description\">\n<article class=\"blog-post-page-font\">\n<div class=\"post-content__body\">\n<div class=\"_2cDMG\">\n<div class=\"_2cDMG\">\n<div class=\"bVAkx _3777I _1dQP3\" data-rce-version=\"8.66.8\">\n<div class=\"kvdbP _2msPJ _189VQ _1O7aH\" dir=\"ltr\" data-id=\"rich-content-viewer\">\n<div class=\"_1hN1O _2S8BH _3EPBy\">\n<div data-hook=\"rcv-block2\"><\/div>\n<p id=\"viewer-clirr\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">As all of us know, Google operates the most widely used Internet search engine on the planet. Google crawls nearly every web page, of every web site, and builds a massive database of all the information it gathers. Most people then use Google&#8217;s database to search by <strong>keywords<\/strong> for articles relevant to the subject of their inquiry. Google then retrieves the most relevant web sites based upon its algorithm (the PageRank algorithm, named for Larry Page, one of Google\u2019s founders) which prioritizes the articles.<\/span><\/p>\n<div data-hook=\"rcv-block5\"><\/div>\n<div id=\"viewer-etp0p\" class=\"_2vd5k _208vH\">\n<div class=\"_3CWa- dhpWm dhpWm _3mymk\">\n<div class=\"_2kEVY\" tabindex=\"0\" role=\"button\" data-hook=\"imageViewer\">\n<div class=\"_3WJnn _2Ybje\"><img decoding=\"async\" class=\"OzAYt _3ii3f\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_4990ed0a5da942bea1a9494307d0146b~mv2.png\/v1\/fit\/w_300,h_300,al_c,q_5\/file.png\" aria-hidden=\"true\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_4990ed0a5da942bea1a9494307d0146b~mv2.png\/v1\/fit\/w_675%2Ch_327%2Cal_c\/file.png\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-hook=\"rcv-block8\"><\/div>\n<p id=\"viewer-2gfkv\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">What few know is that Google has particular keywords and operators that can assist you in extracting precise information from this extraordinary database. As a hacker, that Google database may yield information about potential targets that could prove invaluable, including passwords.<\/span><\/p>\n<p id=\"viewer-1cbmb\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"> Let&#8217;s take a look at a few of those keywords and what they do.<\/span><\/p>\n<div data-hook=\"rcv-block10\"><\/div>\n<h2 id=\"viewer-5aihq\" class=\"eSWI6 _1j-51 _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>Google\u00a0 Keywords<\/strong><\/span><\/h2>\n<div data-hook=\"rcv-block12\"><\/div>\n<div data-hook=\"rcv-block13\"><\/div>\n<p id=\"viewer-9fm0v\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Please note that Google&#8217;s keywords require a colon(:) between the keyword and the search terms, such as <strong>intitle:hackers-arise<\/strong>.<\/span><\/p>\n<p id=\"viewer-b37nc\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Although far from an exhaustive list, here are some of the more widely used Google keywords; <\/span><\/p>\n<div id=\"viewer-23to5\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><\/div>\n<div data-hook=\"rcv-block17\"><\/div>\n<div id=\"viewer-bmimr\" class=\"_2vd5k _208vH\">\n<div class=\"_3CWa- dhpWm dhpWm _28A1_ _1tI2r _1tI2r\">\n<div class=\"_2kEVY\" tabindex=\"0\" role=\"button\" data-hook=\"imageViewer\">\n<div class=\"_3WJnn _2Ybje\"><img decoding=\"async\" class=\"OzAYt _3ii3f\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_0d8cb0af00284ada91dc2d17a1ff9897~mv2.png\/v1\/fit\/w_300,h_300,al_c,q_5\/file.png\" aria-hidden=\"true\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_0d8cb0af00284ada91dc2d17a1ff9897~mv2.png\/v1\/fit\/w_510%2Ch_565%2Cal_c\/file.png\" \/><img decoding=\"async\" class=\"OzAYt _3xs9_\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_0d8cb0af00284ada91dc2d17a1ff9897~mv2.png\/v1\/fill\/w_612,h_678,al_c,lg_1,q_95\/6a4a49_0d8cb0af00284ada91dc2d17a1ff9897~mv2.webp\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_0d8cb0af00284ada91dc2d17a1ff9897~mv2.png\/v1\/fit\/w_510%2Ch_565%2Cal_c\/file.png\" \/><\/div>\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p id=\"viewer-d0qld\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">If you use the <strong>site<\/strong> keyword, Google restricts your search to the site or domain you specify.<\/span><\/p>\n<h2 id=\"viewer-9fhob\" class=\"eSWI6 _1j-51 _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>Google Searching Examples<\/strong><\/span><\/h2>\n<div data-hook=\"rcv-block25\"><\/div>\n<p id=\"viewer-f25fh\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Let&#8217;s look at some examples of how we can use Google hacking to find relevant web sites and files.<\/span><\/p>\n<div data-hook=\"rcv-block27\"><\/div>\n<p id=\"viewer-7fhun\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">As you know, many firms store important financial and other information in Excel files. We could use a simple Google hack that looks for the Excel filetype, \u201c.xls\u201d or \u201c.xlsx\u201d.<\/span><\/p>\n<p id=\"viewer-b5cpv\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>filetype:xls<\/strong><\/span><\/p>\n<p id=\"viewer-2o6ne\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">We can get a bit more selective and combine Google keywords to look for Excel files in government websites (by using the keyword <strong>site<\/strong> with the top level domain <strong>.gov<\/strong>) that have the word &#8220;contact&#8221; in their URL. This yields web pages that have contact lists from government agencies, a possible treasure trove for social engineering.<\/span><\/p>\n<div data-hook=\"rcv-block33\"><\/div>\n<p id=\"viewer-jdgg\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>filetype:xlssite:govinurl:contact<\/strong><\/span><\/p>\n<p id=\"viewer-eslml\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">If I were looking for an Excel file with email addresses, I might use the following:<\/span><\/p>\n<p id=\"viewer-80ihb\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>filetype:xls inurl:email.xls<\/strong><\/span><\/p>\n<div data-hook=\"rcv-block40\"><\/div>\n<p id=\"viewer-ag8s5\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Many PHP applications are vulnerable to SQL injection and other attacks. We can look for these types of web applications with:<\/span><\/p>\n<p id=\"viewer-4lt0a\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>inurl:index.php?id=<\/strong><\/span><\/p>\n<p id=\"viewer-3cte5\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Some other Google hacks that might yield interesting results include:<\/span><\/p>\n<div data-hook=\"rcv-block46\"><\/div>\n<p id=\"viewer-7a4ti\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>intitle:&#8221;site administration:please log in&#8221;<\/strong><\/span><\/p>\n<div data-hook=\"rcv-block48\"><\/div>\n<p id=\"viewer-7m8is\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">If I were pursuing a social engineering attack and I want to gather useful information on my target, I might use:<\/span><\/p>\n<div data-hook=\"rcv-block50\"><\/div>\n<p id=\"viewer-7ctib\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>intitle:&#8221;curriculum vitae&#8221; filetype:doc<\/strong><\/span><\/p>\n<div data-hook=\"rcv-block52\"><\/div>\n<p id=\"viewer-2ivd\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Effectively finding unsecured web cams is one of the more fun aspects of Google hacks. The following list shows some of these effective hacks for finding vulnerable web cams:<\/span><\/p>\n<div data-hook=\"rcv-block53\"><\/div>\n<div id=\"viewer-1sv65\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><\/div>\n<div data-hook=\"rcv-block55\"><\/div>\n<div id=\"viewer-a4iih\" class=\"_2vd5k _208vH\">\n<div class=\"_3CWa- dhpWm dhpWm _3mymk\">\n<div class=\"_2kEVY\" tabindex=\"0\" role=\"button\" data-hook=\"imageViewer\">\n<div class=\"_3WJnn _2Ybje\"><img decoding=\"async\" class=\"OzAYt _3ii3f\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_f5ee347e73c84be79902ecd3bf608dfa~mv2.png\/v1\/fit\/w_300,h_300,al_c,q_5\/file.png\" aria-hidden=\"true\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_f5ee347e73c84be79902ecd3bf608dfa~mv2.png\/v1\/fit\/w_577%2Ch_343%2Cal_c\/file.png\" \/><img decoding=\"async\" class=\"OzAYt _3xs9_\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_f5ee347e73c84be79902ecd3bf608dfa~mv2.png\/v1\/fill\/w_692,h_412,al_c,lg_1,q_95\/6a4a49_f5ee347e73c84be79902ecd3bf608dfa~mv2.webp\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_f5ee347e73c84be79902ecd3bf608dfa~mv2.png\/v1\/fit\/w_577%2Ch_343%2Cal_c\/file.png\" \/><\/div>\n<div class=\"\"><\/div>\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-hook=\"rcv-block56\"><\/div>\n<div data-hook=\"rcv-block58\"><\/div>\n<p id=\"viewer-cpm2s\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">These Google dorks are innumerable and some people such as Johnny Long, specialize in developing effective Google dorks. Johnny Long is famous for developing effective Google dorks and has written a couple of good books on the subject. Another good source for Google dorks is the Exploit Database at <a class=\"_3Bkfb _1lsz7\" tabindex=\"0\" href=\"http:\/\/www.exploit-db.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-hook=\"linkViewer\">www.exploit-db.com<\/a>. If we go there and click on the GHDB tab to the left of the screen, we can find the latest Google dorks.<\/span><\/p>\n<div data-hook=\"rcv-block61\"><\/div>\n<p id=\"viewer-5qjgc\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">When we click on the GHDB tab, it opens:<\/span><\/p>\n<div id=\"viewer-f11c4\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><\/div>\n<div data-hook=\"rcv-block63\"><\/div>\n<div id=\"viewer-af4mj\" class=\"_2vd5k _208vH\">\n<div class=\"_3CWa- dhpWm dhpWm _3mymk\">\n<div class=\"_2kEVY\" tabindex=\"0\" role=\"button\" data-hook=\"imageViewer\">\n<div class=\"_3WJnn _2Ybje\"><img decoding=\"async\" class=\"OzAYt _3ii3f\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_34212d6f16194ef6aaa00a7a5db51746~mv2.png\/v1\/fit\/w_300,h_300,al_c,q_5\/file.png\" aria-hidden=\"true\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_34212d6f16194ef6aaa00a7a5db51746~mv2.png\/v1\/fit\/w_1000%2Ch_664%2Cal_c\/file.png\" \/><img decoding=\"async\" class=\"OzAYt _3xs9_\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_34212d6f16194ef6aaa00a7a5db51746~mv2.png\/v1\/fill\/w_749,h_353,al_c,q_95\/6a4a49_34212d6f16194ef6aaa00a7a5db51746~mv2.webp\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_34212d6f16194ef6aaa00a7a5db51746~mv2.png\/v1\/fit\/w_1000%2Ch_664%2Cal_c\/file.png\" \/><\/div>\n<div class=\"\"><\/div>\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"viewer-edjpp\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _1oG79 _328F_ _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><\/div>\n<div data-hook=\"rcv-block67\"><\/div>\n<p id=\"viewer-4k1nl\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Here we can find thousands of Google dorks. Some are more effective than others.<\/span><\/p>\n<div data-hook=\"rcv-block68\"><\/div>\n<p id=\"viewer-2darr\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">We can be very specific about the kind of dorks we are seeking. For instance, if we were targeting WordPress websites, we could enter the keyword \u201cwordpress&#8221; in the search window, and this site would display all the Google dorks relevant to WordPress built websites (WordPress is the world&#8217;s most popular content management system for building websites). Among the many Google dorks we find here is a more complex one that combines several phrases:<\/span><\/p>\n<div data-hook=\"rcv-block70\"><\/div>\n<p id=\"viewer-8a4kj\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>filetype:sqlintext:password | pass | passwdintext:usernameintext:INSERT INTO `users` VALUES<\/strong><\/span><\/p>\n<div data-hook=\"rcv-block72\"><\/div>\n<p id=\"viewer-5nkkf\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">When we use this dork, we find several web sites. When we click on one, we find the following:<\/span><\/p>\n<div id=\"viewer-15asf\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _1oG79 _328F_ _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><\/div>\n<div data-hook=\"rcv-block74\"><\/div>\n<div id=\"viewer-dtu31\" class=\"_2vd5k _208vH\">\n<div class=\"_3CWa- dhpWm dhpWm _3mymk\">\n<div class=\"_2kEVY\" tabindex=\"0\" role=\"button\" data-hook=\"imageViewer\">\n<div class=\"_3WJnn _2Ybje\"><img decoding=\"async\" class=\"OzAYt _3ii3f\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_e686354e5b0d4114bcf7211094140f27~mv2.png\/v1\/fit\/w_300,h_300,al_c,q_5\/file.png\" aria-hidden=\"true\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_e686354e5b0d4114bcf7211094140f27~mv2.png\/v1\/fit\/w_1000%2Ch_682%2Cal_c\/file.png\" \/><img decoding=\"async\" class=\"OzAYt _3xs9_\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_e686354e5b0d4114bcf7211094140f27~mv2.png\/v1\/fill\/w_749,h_497,al_c,q_95\/6a4a49_e686354e5b0d4114bcf7211094140f27~mv2.webp\" data-pin-url=\"https:\/\/www.hackers-arise.com\/post\/osint-google-hacking-and-dorks-to-find-key-information\" data-pin-media=\"https:\/\/static.wixstatic.com\/media\/6a4a49_e686354e5b0d4114bcf7211094140f27~mv2.png\/v1\/fit\/w_1000%2Ch_682%2Cal_c\/file.png\" \/><\/div>\n<div class=\"\"><\/div>\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p id=\"viewer-aivl4\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">As you can see, we were able to find a SQL script that inserted users and passwords into a database. As we can scan through this script, we find numerous username and password pairs. These should make hacking these accounts pretty simple!<\/span><\/p>\n<h2 id=\"viewer-5rhes\" class=\"eSWI6 _1j-51 _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>Google Searching Summary<\/strong><\/span><\/h2>\n<div data-hook=\"rcv-block81\"><\/div>\n<p id=\"viewer-3mdj5\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Google hacking is a key skill that every hacker should be aware of and master. In many cases, it can yield information on our target that may save us hours or even days in exploiting the target.<\/span><\/p>\n<div data-hook=\"rcv-block83\"><\/div>\n<p id=\"viewer-e4qge\" class=\"mm8Nw _1j-51 _1atvN _1FoOD _3M0Fe _2WrB- _1atvN public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">As we continue to expand on information gathering techniques, keep in mind that you are <strong>unlikely<\/strong> to use all of these techniques on one project. Each project is unique, and you will need to customize your information gathering techniques to the target. It is also important to note here that we are using publicly available information that does not require we &#8220;touch&#8221; the domain or website of the potential target and, thereby, trigger some alert by an Intrusion Detection System (IDS) or other security devices as we are gathering information on the target.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n\n<div class=\"twitter-share\"><a href=\"https:\/\/twitter.com\/intent\/tweet?via=cpizaragozasur\" class=\"twitter-share-button\" data-size=\"large\">Twittear<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Specific Google Search\u00a0 (cc2 Hackers arise) As all of us know, Google operates the most widely used Internet search engine on the planet. Google crawls nearly every web page, of&#8230;<\/p>\n","protected":false},"author":355,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_s2mail":"yes","footnotes":""},"categories":[30],"tags":[32,31],"class_list":["post-421","post","type-post","status-publish","format-standard","hentry","category-google-search","tag-google-find","tag-google-search"],"_links":{"self":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts\/421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/users\/355"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/comments?post=421"}],"version-history":[{"count":1,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts\/421\/revisions"}],"predecessor-version":[{"id":422,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/posts\/421\/revisions\/422"}],"wp:attachment":[{"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/media?parent=421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/categories?post=421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.catedu.es\/zgzsur\/wp-json\/wp\/v2\/tags?post=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}