0% found this document useful (0 votes)
489 views1 page

The Top 15 Google Dorking Commands You Need To Know

The document provides an overview of Google Dorking, a technique used in cyber security to perform advanced searches on Google to find sensitive information. It includes a list of the top 15 Google Dorking commands, their functions, and examples of how to use them effectively. Additionally, it emphasizes the legal implications of misusing these commands and offers resources for further learning.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
489 views1 page

The Top 15 Google Dorking Commands You Need To Know

The document provides an overview of Google Dorking, a technique used in cyber security to perform advanced searches on Google to find sensitive information. It includes a list of the top 15 Google Dorking commands, their functions, and examples of how to use them effectively. Additionally, it emphasizes the legal implications of misusing these commands and offers resources for further learning.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

COURSES BLOG RESOURCES SIGN IN MEMBERSHIP

Table of Contents

What Is a Google Dork?

Google Dorking Command


Generator

Top 15 Google Dorking


The Top 15 Google Dorking 76
SHAR

Commands Commands You Need To Know


Conclusion
May 11, 2024 Cassandra Lee

Level Up in Cyber Security:


Join Our Membership Today!

LEARN MORE

 Listen to the article

Perhaps you’re here because you’ve found the term “Google dorking” or “Google hacking” in
cyber security and want to learn more. Or perhaps you want to save time on web searches
and improve your OSINT abilities. But do you nd yourself overwhelmed with commands
when you review all the search results on this hot-button topic?

Don’t worry, we’ve got you covered. With this Google dorking commands list, beginners can
nally apply Google dorking straightaway. At the same time, advanced users can use this as
a handy guide to pull down publicly available sensitive information from their servers before
they could cause further damage.

Abusing Google dorks can get you in trouble legally and otherwise. See the difference
between “reconnaissance” and “scanning” in the next section. When in doubt, skip the dork.

When you’re ready, let’s dive into these Google dorking commands.

What Is a Google Dork?


Most people know what a Google search is. A Google dork is an advanced Google search
using only the search box. Combining Google dorks in a single query helps you lter out
irrelevant content.

To understand how to Google dork, you need to grasp several essential points:

The Anatomy of a Successful Hack


Five phases characterize a successful hack into a target, such as a website or a server:

1. Reconnaissance: Gathering intelligence about the target.


2. Scanning: Exploring the target, clicking links, using remote scanning tools.
3. Gaining access: Actively exploiting the target to get access.
4. Maintaining access: Establishing a way to easily reconnect to the target if your
connection breaks or you wish to return later.
5. Clearing tracks: Exiting the target without a trace, removing all exploits and back doors,
clearing logs.

You can use Google dorking to conduct step 1 above, but once you click on the search
results, submit data, or access links without proper permissions, you enter step 2 and may be
accountable for computer crimes punishable by law. Click with caution.

To Google dork, you include dork commands and operators in a Google query and interpret
the search results as you see t.

Google Dorking Command Generator


Say goodbye to the hassle of trying to remember the exact syntax for your Google
Dorking commands! With our Google Dorking Command Generator, you can simply
say what you need Google Dorking to do, and we will generate the command for you.

get all pages of www.stationx. Generate

Grab Your FREE


Google Dorking Cheat
Sheet Now!
Want to keep all Google
Dorking commands at your
fingertips? Just enter your email
address, and we’ll send the
cheat sheet to your inbox.

First name

Email Address

DOWNLOAD →

Top 15 Google Dorking Commands


For each of the following Google dorks, we’ll describe its function, the expected search
results it returns, and why it’s useful, ending with a demonstrative screenshot.

Allintitle:
The allintitle: dork looks for pages with titles containing the search terms. It applies to
the entire query string. You can see each word in the query string in the title of each search
engine result returned. It’s useful when the title of your desired web resource contains a
series of keywords.

allintitle:cyber security essentials

Allinurl:
The allinurl: dork nds links containing all words following the colon (:), and it’s
equivalent to applying inurl: to discrete search strings. You can see all query items in the URL
of each Google search result returned. It’s a useful dork when you know what to look for in
your desired URLs.

allinurl:cyber security hacker

Cache:
Using the cache: dork, when you press Enter/Return, the Google search console fetches the
last saved copy of a particular website (Google cache) if it exists and displays it. It’s useful for
rediscovering a website before its downtime or latest update.

cache:courses.stationx.net

De ne:
The define: dork returns de nitions of a word or phrase. The Google search results are
various dictionary de nitions of the query item. It’s useful when you want to nd a word or
phrase’s meaning conveniently.

define:reconnaissance

Ext:
The ext: dork restricts the returned web addresses to the designated extension, such as
PDF or XLS. Unlike most other dorks, it requires additional keywords/dorks in the search bar,
or it’ll return no results. The Google search results have the designated le extensions. You
can use it to nd leaked passwords and cameras in penetration testing (pentesting).

ext:php site:microsoft.com

Filetype:
The filetype: dork restricts the returned web addresses to the designated le type, such
as PDF or XLS. Unlike most other dorks, it requires additional keywords/dorks in the search
bar, or it’ll return no results. The Google search results have the designated le type. It’s
necessary for pentests such as bypassing paywalls to access resources.

filetype:pdf site:apple.com

Info:
The info: dork returns pages that convey information about a website. The Google search
engine results are the website’s cache, similar pages, and pages that link to it. It’s useful when
you want to nd third-party resources about a web page.

info:www.stationx.net -site:www.stationx.net

Intext:
The intext: dork nds websites containing the query string. You can see the query string in
the text body of each Google search result returned. It’s useful when the content body of
your desired web page contains a certain keyword. In the demonstration below, we’re
looking for web pages of books with “munira” in the body but include “tom” anywhere.

intext:munira tom site:goodreads.com

 00:00 00:00 1 

Intitle:
The intitle: dork looks for pages with titles containing the search terms. You can see the
query string in the title of each Google search result returned. It’s useful when the title of
your desired web resource contains a certain keyword. In the example below, we look for all
our pages containing “google” in the title.

intitle:google site:www.stationx.net

Inurl:
The inurl: dork nds URLs containing the character string. You can see the query string in
the URL of each Google search result returned. In the example below, the additional dork is
to exclude search results from our website. It’s a handy dork when your desired URLs follow
a certain pattern.

inurl:stationx -site:www.stationx.net

Link:
The link: dork nds web pages linking to the given web domain. The Google search results
can be from the given domain or third-party websites linking to the given domain. It can help
you when you want to estimate the impact of a web resource.

link:www.stationx.net "kali purple"

Grab Your FREE


Google Dorking Cheat
Sheet Now!
Want to keep all Google
Dorking commands at your
fingertips? Just enter your email
address, and we’ll send the
cheat sheet to your inbox.

First name

Email Address

DOWNLOAD →

Map:
The map: dork is for getting a map of the given location. Google returns with the map you’re
seeking. On macOS, you may see a prompt to open the Maps application. It’s useful when
you want a quick map of your desired location.

map:1hackerrd

Phonebook:
The phonebook: dork is for getting a speci c person or business’s phone numbers and
contact information. The Google search may return no results or several. The screenshot
demonstration below has to do with ctional US phone numbers. This command is helpful
when you want to look up caller IDs.

phonebook:555-555-5555

Related:
The related: dork returns websites about a given website. The Google search results are
similar websites as the one speci ed. This dork is convenient when you want to broaden your
scope and need help guring out where to start.

related:www.stationx.net security

Site:
The site: dork restricts your search to a particular website, top-level domain, or subdomain.
Additional query items are optional. The Google search results are pages within the website,
top-level domain, or subdomain that contain your query items. It’s essential for focusing on
content from a particular web location, such as your server.

site:www.stationx.net nmap

Conclusion
We hope this top 15 list of Google dorking commands helps you nish your work quickly,
ef ciently, and ethically. For more resources on Google dorking, check out our Google
Dorking Cheat Sheet, How to Google Dork a Speci c Website for Hacking, and our course
offerings below.

The Complete Cyber Security The Complete Web Recon for Ethical Hacking /
Course Network Security Penetration Testing & Bug Penetration Testing & Bug
Bounty Course Bounty
4.8 ★★★★★

4.9 ★★★★★
★ 4.8 ★★★★★

76 LinkedIn X Facebook
SHARES

Level Up in Cyber Security: Join Our


Membership Today!

MEMBERSHIP

Cassandra Lee
Cassandra is a writer, artist, musician, and technologist who makes connections across
disciplines: cyber security, writing/journalism, art/design, music, mathematics, technology,
education, psychology, and more. She's been a vocal advocate for girls and women in STEM
since the 2010s, having written for Huf ngton Post, International Mathematical Olympiad
2016, and Ada Lovelace Day, and she's honored to join StationX. You can nd Cassandra on
LinkedIn and Linktree.

Related Articles

Nmap Cheat Sheet Social Engineering Best Hacker Movies


2024: All the Example Top 10 jobs you can : From Algorithm to
Commands & Flags hire a black hat Zero Days
Read More »
hacker to do!
Read More » Read More »
Read More »

INFO SECURITY CONSULTING


ASSESSMENT
Af liates Audit & Compliance

Legal Notices Penetration Testing Incident Response


Vulnerability Scanning
Privacy Policy Security Architecture

Site Map Build Reviews Risk Assessment


Source Code Review
Careers Security Training
Social Engineering Pro Bono Services

Nathan House
COPYRIGHT © 2024 STATIONX LTD. ALL RIGHTS RESERVED.

You might also like