Google Dorking Queries to find vulnurable targets

1 month ago 21
BOOK THIS SPACE FOR AD
ARTICLE AD

Kanishk Kumar

Google Dorking is often underestimated, yet it can be a mine gold. Whether you’re hunting for vulnerabilities as a bug bounty hunter or strengthening the security of your own organization, dorking queries can be a powerful tool in your arsenal.

Basic Content Discovery:site:airbnb.com

2. Exposed Directories:

site:airbnb.com intitle:index.of

3. Sensitive Configuration Files:

site:airbnb.com ext:conf | ext:cnf | ext:config | ext:ini

4. Database Files:

site:airbnb.com ext:sql | ext:db | ext:dbf | ext:mdb

5. Log files:

site:airbnb.com ext:log

6. Backup Files:

site:airbnb.com ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup

7. Source Code Files:

site:airbnb.com ext:php | ext:jsp | ext:asp | ext:aspx | ext:js | ext:java | ext:py | ext:c | ext:cpp | ext:pl

8. Sensitive Document Files:

site:airbnb.com ext:doc | ext:docx | ext:pdf | ext:xls | ext:xlsx | ext:ppt | ext:pptx

9. Usernames and Passwords:

site:airbnb.com intext:username | intext:password | intext:passwd

10. XMLPRC.PHP file:

site:airbnb.com inurl:xmlrpc.php

11. Admin Panels:

site:airbnb.com inurl:admin | inurl:login | inurl:dashboard

12. Exposed APIs:

site:airbnb.com inurl:api | inurl:rest | inurl:graphql

13. Exposed .git Repos:

site:pro.opensea.io inurl:.git

14. Sensitive Development Files:

site:pro.opensea.io ext:env | ext:yaml | ext:json

15. Potential SSRF Parameters:

site:pro.opensea.io inurl:link= | inurl:url= | inurl:path= | inurl:dest= | inurl:redirect= | inurl:next= | inurl:redirectto=

16. Error Pages:

site:pro.opensea.io intext:"error" | intext:"warning" | intext:"not found" | intext:"exception"

17. PHP Information Disclosures:

site:pro.opensea.io ext:php intext:"phpinfo()" | intext:"PHP Version"

18. Session IDs in URLs:

site:pro.opensea.io inurl:sessionid | inurl:JSESSIONID | inurl:PHPSESSID

19. Directory Listing:

site:tesla.cn "parent directory"

20. CMS Exposure:

site:pro.opensea.io inurl:wp- | inurl:joomla | inurl:drupal | inurl:magento

Now if you find a domain and a path that looks something like “/assets/scripts/” or “/private/documents/” you can use any of these combinations:

site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" filetype:php
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" filetype:doc
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" filetype:xls
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" filetype:txt
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" intext:"password"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" intext:"config"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" inurl:"config"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" inurl:"backup"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" inurl:"database"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" inurl:"setup"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" intitle:"index of"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" intext:"error"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" intext:"log"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" intext:"debug"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" inurl:"shell"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" inurl:"php"
site:urs.testing-only.nasa.gov inurl:"/assets/documentation/scripts/" inurl:"cgi

Thanks for reading!

Read Entire Article