100% found this document useful (1 vote)
981 views27 pages

Dorking 101 The Art of Passive Recon: by Christy Long

This document provides an overview of passive reconnaissance techniques using Google searches, known as 'dorking'. It discusses using Boolean operators, searching within titles, URLs, text and files. It also covers caching pages, directory traversal, and searching for configuration files, log files and office documents.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
981 views27 pages

Dorking 101 The Art of Passive Recon: by Christy Long

This document provides an overview of passive reconnaissance techniques using Google searches, known as 'dorking'. It discusses using Boolean operators, searching within titles, URLs, text and files. It also covers caching pages, directory traversal, and searching for configuration files, log files and office documents.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Dorking 101

The Art of Passive Recon

By Christy Long
What is Dorking?

• The use of Google search engine to obtain information.


• Prioritized by page ranking
• Simplest search is a word
• Security
• Use of a Combination of words
• Cyber Threat Analyst
• Use of quotes to find a phrase or string
• “Certified Ethical Hacker”
• Google Searching is not Case Sensitive
• Some searches with operators or special characters are case
sensitive
Character Limit for searching

• 32 – Character Limit
for searches
• Wildcards * do not take
up a character spot

Example
If we search
“Certified * Systems *Professional”
Google will see this as 4 words
including the quote
Common Boolean Operators
• Boolean operators are used to improve the
efficiency of your search results by defining
the relationship between the search terms
• Operators are case sensitive
Word Symbol Result

AND + Used to include multiple items in a search

OR | Used to find either item in a search

NOT - Used to remove items in a search


Search by Domain

• To search for information on a specific domain or server


use site operator.
• Works with various operators
• Best used with web, images or group searches

Cartek Consulting gave permission to use their domain


https://www.cartekconsulting.com/ for the creation of this presentation
Searching Files

• File types can help you prepare for a presentation by


looking for pdf’s or pptx
• Filetype:pdf
Searching for Titles - intitle

• Intitle: Allows you to search for items or


specifics within the title
• You can use “” to look for multiple words

• This example uses “index of” and “backup files”


• If this search were successful, we would have backup
files to something on the domain of the site we
searched.
• This search did not return any results. Great Job
Cartek Consulting!
Searching within URLs - inurl

• Inurl allows you to search for strings within the


address of the webpage
• The special characters such as :// can cause
various results when used with inurl operator
• Searching for the word admin might bring up
access to admin consoles, extranets
• Another common search is index.filetype
• Inurl:index.php
• Inurl:index.log
Searching in text - intext

• The intext operator allows you


the hunter to find words
within the body of text
• If you use intext:(password |
passcode) you are looking for
all search results with
passwords or passcodes which
could potentially allow you
the ethical hacker to access
something
• In this case, we learned how to
protect our password
Complex Searches

• Combining multiple operators can


refine a search to reveal
important results only
• Intext:passcode | password
intext:userid | username | email
filetype:csv
• Intext:(passcode OR password) AND
intext:(userid OR username OR
email) filetype:csv
• Both examples produce the same
results and read: find all pages
which have passcodes, passwords,
and show userid, usernames, or
email located in a csv file
Generic search without site operator
Cached Pages
Stealth Search
• Many companies log and monitor traffic on their websites. Use
the Cache Operator to view older snapshots (Picture) of the
site.
• Example: cache:cartekconsulting.com
• The page is a stored copy housed by google. Any investigating
you do on the website will go undetected by the company.

• Cache command does not work well with other operators


Cached Pages

• If the company accidentally leaked sensitive data to


the internet and removed it; a cached page may still
display the information leak.

• Googles Cached Banner tells the viewer when the page


was captured and may contain other clues which could
help while investigating a company.
• If the cached page pulls a picture from the original
domain, this may alert the company to your presence.
• Most Hackers use a VPN or Proxy Server for anonymity.
Capturing Your Actions

• Open PowerShell or CMD


• Change Directory
• Cd C:\Program Files\wireshark>
• Choose an Interface to Capture Traffic
• View interfaces type: .\tshark.exe –D

• Capture Traffic on the correct interface

• Save the traffic


Saving the Packet Capture
• Some environments will not allow Wireshark GUI to
capture a PCAP file. It is essential to understand how the
command line works.
• To save the PCAP append the capture command with a –w
followed by the location to save the file and the file name

• Double Click the File to Open in Wireshark


• The cached site is hosted on Google and does not talk to
the domain.
Directories
Directories
• Directories contain
• Files
• Folders
• Sensitive data
• Many directories contain “Index of”
• If you search intitle:index.of of “index of” you will
receive several false positives
• Try refining your directory search with
• “Parent Directory”
• Index.of name size
• Index.of.admin or intitle:index.of inurl:admin
• Index.of backup
• Intitle.index.of filetype.log
• Intitle.index.of inurl:software
Traversing Directories

• If you look at the URL


https://www.cartekconsulting.
com/about-us/why-are-we-
here/
• The / represents different
directories on the webpage.
• If you delete “why-we-are-
here/” you will go to a
directory 1 level above your
current location
• The image shows three
ways to move directories
accessing the same
information.
Directory Walking

• Changing the URL to find more


information
• Delete the / at the end of the
domain
• example /download
• Moreover, try replacing the
foldername with /doc /backup or
other common names for a directory
• If the site does not display
directory folders and you have to
guess directory names try using
the site operator combined with
inurl operator
Incremental Substitution

• Replacing numbers
• Find hidden directories or files
• You can increase or decrease the starting
number in anything that contains a number
• Change 1005 to 1004 or 1006 and look for new
documents or files
Database Digging

• Things to look for


• Login Portals
• Support Files
• Error Messages
• Configuration Files
• Log Files
• Database Dumps
• Search Terms
• Login
• Welcome
• Copyright
• SQL
• “#dumping data for table”
Focused Search
Configuration Files

• Expose sensitive and/or confidential


information
• A file containing data about a program,
computer, file, and/or user
• Narrow search commands with site
operator
• Common search terms
• Config
• Conf
• cfg
• Helpful file extensions
• filetype:config
• filetype:cfg
• filetype:ini
• filetype:txt
Log Files
• Log files show events, provide non-repudiation, these are messages
written to a file
• Common search terms
• Filetype:log
• Ext:log
Common search terms
• Inurl:log
• Examples of Log Manager
• Splunk
• Snort
• Sumo Logic
• Qradar
• AlienVault
• Solar Winds
• Tenable
• Others
• Search key terms based on the log aggregator to help narrow the
search criteria
Office Documents

• Office documents are files created by software


such as word processors, spreadsheet software,
products commonly used for day to day operations
• Properties
• Usernames
• Passwords
• Backup
• File Extensions
• Doc, docx
• Pdf, pdfx
• Txt
• Xml, csv, xls
• Others
Questions
Additional References

• Telegram: @Tech_Hacksaver
• Website: techhacksaver.com
• Twitter & Instagram: @Tech_hacksaver

You might also like