The Ultimate Google Dorking Cheat Sheet – 2023 | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!

The Ultimate Google Dorking Cheat Sheet – 2023

The Ultimate Google Dorking Cheat Sheet – 2023

LV
1
 

trabalhandoduro

Member
Joined
Oct 13, 2022
Threads
22
Likes
36
Awards
4
Credits
1,735©
Cash
0$
Google Dorking, also known as Google hacking, is a powerful technique used by security researchers and ethical hackers to uncover sensitive information and vulnerabilities on the web. It involves crafting specific Google search queries that reveal information that is not meant to be publicly accessible. This powerful tool is a valuable asset to anyone who wants to understand the dark side of the web and protect themselves from online threats. We offer you, the ultimate Google Dorking Cheat Sheet, for 2023!

In this article, we have put together a comprehensive cheat sheet of 200 Google dork queries that you can use to start exploring the hidden corners of the web. Whether you’re a seasoned security professional or just starting out in the field, our cheat sheet will provide you with the tools you need to get the most out of Google Dorking. The queries can be used for searching specific information on a target, or simply to speed up your online searching by removing false positives. Our cheatsheet has you covered. As part of this exercise, a lot of users have stated the popular website OnlyFans is quite limited in its internal searching features; therefore, we’ve provided some nifty Google dorks for OnlyFans investigations.

So, buckle up and get ready to dive into the fascinating world of Google Dorking!

#Google Dork QueryExplanation
1filetype:pdf passwordSearches for PDF files containing the word “password”.
2intitle:index.of password.txtSearches for websites with “index.of” in the title and the word “password.txt”.
3intext:”username” filetype:xlsSearches for Excel files containing the word “username”.
4intext:”email” filetype:pdfSearches for PDF files containing the word “email”.
5inurl:admin loginSearches for webpages with “admin” and “login” in the URL.
6intitle:”Login page” “Username” “Password”Searches for pages with the title “Login page”, “Username”, and “Password”.
7inurl:login intext:”password”Searches for pages with “login” in the URL and the word “password” in the text.
8inurl:.php?id=Searches for pages containing “.php?id=” in the URL.
9intitle:”SQL query failed” intext:”mysql”Searches for pages with the title “SQL query failed” and the word “mysql” in the text.
10site:.edu filetype:pdfSearches for PDF files on “.edu” websites.
11intext:”Private Key” filetype:pemSearches for files with “Private Key” in the text and the file type “pem”.
12intitle:”Index of /” +passwdSearches for websites with “Index of /” in the title and the word “passwd”.
13intitle:”Index of /” +secretSearches for websites with “Index of /” in the title and the word “secret”.
14intext:”Confidential” filetype:pptSearches for PowerPoint files with the word “Confidential” in the text.
15intext:”Database Error” intitle:”Warning”Searches for pages with the text “Database Error” and the title “Warning”.
16intext:”PHP Script” “Debug”Searches for pages with the text “PHP Script” and the word “Debug”.
17intext:”to=python” filetype:pySearches for Python files with the text “to=python”.
18intext:”API Key” filetype:ymlSearches for YAML files with the text “API Key”.
19intext:”API Key” filetype:envSearches for environment files with the text “API Key”.
20intext:”Private Key” filetype:keySearches for files with the text “Private Key” and the file type “key”.
21intext:”System Information” filetype:logSearches for log files with the text “System Information”.
22intitle:”Index of /” +backupSearches for websites with “Index of /” in the title and the word “backup”.
22 Generic google dork queries in a cheatsheet format to search for security-related files on Google.
#Google Dork QueryExplanation
24intext:”username” intitle:”config”Searches for pages with the text “username” and the title “config”.
25intext:”Password” intitle:”Settings”Searches for pages with the text “Password” and the title “Settings”.
26intext:”password” intitle:”configuration”Searches for pages with the text “password” and the title “configuration”.
27intext:”secret” intitle:”config”Searches for pages with the text “secret” and the title “config”.
28intext:”API Key” intitle:”documentation”Searches for pages with the text “API Key” and the title “documentation”.
29intext:”server_name” filetype:nginxSearches for Nginx configuration files with the text “server_name”.
30intext:”database_password” filetype:envSearches for environment files with the text “database_password”.
31intext:”API Key” intitle:”Readme”Searches for pages with the text “API Key” and the title “Readme”.
32intext:”ssh” intitle:”authorized_keys”Searches for pages with the text “ssh” and the title “authorized_keys”.
33intext:”AWS Key” intitle:”Credentials”Searches for pages with the text “AWS Key” and the title “Credentials”.
34intext:”AWS Access Key” intitle:”Settings”Searches for pages with the text “AWS Access Key” and the title “Settings”.
35intext:”api_key” intitle:”Settings”Searches for pages with the text “api_key” and the title “Settings”.
36intext:”access_token” intitle:”config”Searches for pages with the text “access_token” and the title “config”.
37intext:”client_secret” intitle:”config”Searches for pages with the text “client_secret” and the title “config”.
38intext:”private_key” intitle:”documentation”Searches for pages with the text “private_key” and the title “documentation”.
39intext:”master_key” intitle:”documentation”Searches for pages with the text “master_key” and the title “documentation”.
40intext:”db_password” intitle:”config”Searches for pages with the text “db_password” and the title “config”.
Internal server related Google Dorks to find exposed config files used to set up servers.
#Google Dork QueryExplanation
41intext:”ftp_password” intitle:”config”Searches for pages with the text “ftp_password” and the title “config”.
42intext:”root_password” intitle:”config”Searches for pages with the text “root_password” and the title “config”.
43intext:”sql_password” intitle:”config”Searches for pages with the text “sql_password” and the title “config”.
44intext:”jwt_secret” intitle:”config”Searches for pages with the text “jwt_secret” and the title “config”.
45intext:”secret_key” intitle:”config”Searches for pages with the text “secret_key” and the title “config”.
46intext:”encryption_key” intitle:”config”Searches for pages with the text “encryption_key” and the title “config”.
47intext:”key” intitle:”ssh_config”Searches for pages with the text “key” and the title “ssh_config”.
48intext:”password” filetype:envSearches for environment files with the text “password”.
49intext:”api_key” filetype:envSearches for environment files with the text “api_key”.
50intext:”secret_key” filetype:envSearches for environment files with the text “secret_key”.
51intext:”password” filetype:yamlSearches for YAML configuration files with the text “password”.
52intext:”api_key” filetype:yamlSearches for YAML configuration files with the text “api_key”.
53intext:”secret_key” filetype:yamlSearches for YAML configuration files with the text “secret_key”.
54intext:”password” filetype:jsonSearches for JSON configuration files with the text “password”.
55intext:”api_key” filetype:jsonSearches for JSON configuration files with the text “api_key”.
56intext:”secret_key” filetype:jsonSearches for JSON configuration files with the text “secret_key”.
57intext:”password” filetype:xmlSearches for XML configuration files with the text “password”.
58intext:”api_key” filetype:xmlSearches for XML configuration files with the text “api_key”.
59intext:”secret_key” filetype:xmlSearches for XML configuration files with the text “secret_key”.
60intext:”ssh” intitle:”id_rsa”Searches for pages with the text “ssh” and the title “id_rsa”.
61intext:”ssh” intitle:”id_dsa”Searches for pages with the text “ssh” and the title “id_dsa”.
62intext:”private_key” intitle:”ssh”Searches for pages with the text “private_key” and
Server Configuration Related Dorks. Less commonly found, but when found…can be pretty juicy!


Very Specific Server file Dorks (hit and miss!)​

#Google Dork QueryExplanation
62intitle:”Index of /” +”parent directory” +description +size +last modified +”Apache” +”Windows”Same as above, but for Windows-based servers.
63intitle:”Index of /” +”parent directory” +description +size +last modified +”Microsoft-IIS” +”Unix”Same as above, but for Microsoft IIS servers on Unix-based systems.
64intitle:”Index of /” +”parent directory” +description +size +last modified +”Microsoft-IIS” +”Windows”Same as above, but for Microsoft IIS servers on Windows-based systems.
65intitle:”Index of /” +”parent directory” +description +size +last modified +”Nginx” +”Unix”Same as above, but for Nginx servers on Unix-based systems.
66intitle:”Index of /” +”parent directory” +description +size +last modified +”Nginx” +”Windows”Same as above, but for Nginx servers on Windows-based systems.
67inurl:backupSearches for pages containing the word “backup”, often revealing sensitive backup files and directories.
68inurl:backup filetype:sqlSearches for SQL backup files.
69inurl:backup filetype:bakSearches for files with the .bak extension, often revealing backup files.
70inurl:backup filetype:tarSearches for tar archive files, often containing backup data.
71inurl:backup filetype:gzSearches for gzip-compressed files, often containing backup data.
72inurl:config.phpSearches for pages containing the phrase “config.php”, often revealing sensitive configuration files.
73inurl:wp-config.phpSearches for pages containing the phrase “wp-config.php”, often revealing sensitive WordPress configuration files.
74inurl:database.phpSearches for pages containing the phrase “database.php”, often revealing sensitive database configuration files.
75inurl:error_logSearches for pages containing the phrase “error_log”, often revealing sensitive error logs.
76inurl:access_logSearches for pages containing the phrase “access_log”, often revealing sensitive access logs.
77inurl:phpinfo.phpSearches for pages containing the phrase “phpinfo.php”, often revealing sensitive PHP information.
78inurl:server-statusSearches for pages containing the phrase “server-status”, often revealing sensitive server information.
79inurl:phpmyadminSearches for pages containing the phrase “phpmyadmin”,often revealing sensitive PHPMyAdmin information.
Very Specific Server file Dorks (hit and miss!). You’ll not often see results for these, but where they do occur, it can be a goldmine!

Generic File Searching Dorks​

filetype:pemSearches for PEM certificate files.
filetype:cerSearches for certificate files with the .cer extension.
filetype:keySearches for encryption key files.
filetype:ppkSearches for PuTTY private key files.
filetype:pfxSearches for PKCS #12 certificate files.
filetype:ascSearches for ASCII armored PGP or GPG files.
filetype:crtSearches for certificate files with the .crt extension.
filetype:csrSearches for certificate signing request files.
filetype:derSearches for binary DER certificate files.
These just search for specific file types. You can modify these to search for any kind of file you are interested in.
 
  • Like
Reactions: fognayerku and usamaaaa

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Top Bottom