Google Dorks: An Easy Way of Hacking | Cybrary (2023)

Amazon Web Services is currently experiencing an outage that may impact your experience on the Cybrary application. We apologize for any inconvenience and will be monitoring this situation closely

February 6, 2020

Google Dorks: An Easy Way of Hacking | Cybrary (74)


Google Dorks: An Easy Way of Hacking | Cybrary (75)

The Google Search Engine finds answers to our questions, which is helpful in our daily lives. You can search for your school assignments, reports, presentations, and more. Before I start the tutorial on using use Google Dorks in Penetration Testing and Ethical Hacking, I'm going to share a definition of Google Dork queries that I saw on

A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website.

In other words, we can use Google Dorks to find vulnerable websites, servers and discover hidden information buried deep in online databases. Since Google has a searching algorithm and indexes most websites, it can be useful to a hacker to find vulnerabilities on a target. The basic syntax for advanced operators in Google is:


For example, this operator_name:keyword syntax can be typed as filetype:xls intext:username in the standard search box, which results in a list of Excel files, which contain the term 'Username.'

Simple Google Dorks Syntax (see Figure 1)

site - will search a specific website only. Example: COVID19 site: (This search for the term COVID19 within the World Health Organization website only.

allintitle and intitle - the title of the page contains the specified search term.

inurl - restricts the results to those where the specified search keyword contained in the URLs.

filetype - search for a specified file type. Example: filetype:PDF (this return only file types PDF contain the search keyword/s.

Google Dorks: An Easy Way of Hacking | Cybrary (76)

(Video) Hacking with Google Dorking!

What Data Can We Find Using Google Dorks?

  • Admin login pages
  • Usernames and passwords
  • Vulnerable entities
  • Sensitive documents
  • Government/military data
  • Email lists
  • Bank account details and more

Find Sub-domain Names

Google Dorks can also be used for network mapping. We're able to find a target site's subdomain using a simple Dork (see Figure 2).

Google Dorks: An Easy Way of Hacking | Cybrary (77)

Try to scan, and we find some of the subdomains using the master website.

Explore Live Cameras

Using Google dorks, we can find exposed internet cameras that are not restricted by IP address. There are many Google Dorks to find internet cameras. Here are two examples:

intitle:"IP CAMERA Viewer" intext:"setting | Client setting" (see Figure 4) intitle:NetworkCamera intext:"Pan / Tilt" inurl:ViewerFrame (see Figure 5)

Google Dorks: An Easy Way of Hacking | Cybrary (78)

Google Dorks: An Easy Way of Hacking | Cybrary (79)

Additional Google Dorks Examples

  1. To search within social media sites, use the symbol @ followed by a social media name; then enter a colon in your search query. For example, enter @facebook:keyword to search for the term keyword within Facebook.
  2. To search for hashtags, put a # sign before your search term. For example, enter #USAelection.
  3. To search for the unknown words, use the asterisk (*) to substitute it with one or more words. For example, enter data hiding in *.
  4. Use the keyword map: followed by location name, and Google will show you map-based results. For example, enter map:New York.
  5. You can even check flight information using Google. Type your airline company name and the flight number in the Google search box, and it will show you flight status information (see Figure 6).

Google Dorks: An Easy Way of Hacking | Cybrary (80)


Google is the most reputable and powerful search engine in the world. Google indexes billions of web pages, making them accessible to the public, who easily use its simple search interface.

In this article, we have shown the potential of Google Dorks (also known as Google hacking) for finding sensitive content online that we cannot find when using Google's simple search interface. Google Dorks can be used to restrict or narrow- our search to return only relevant results. Additionally, they can discover leaked information, vulnerable services in websites, and online applications. Keep in mind that malicious actors can use Google Dorks to find sensitive information about any entity (e.g., individual or organization) to help them in executing their attacks.

Start learning with Cybrary

Google Dorks: An Easy Way of Hacking | Cybrary (81)

Create a free account

Google Dorks: An Easy Way of Hacking | Cybrary (82)

Related Posts

All Blogs

Google Dorks: An Easy Way of Hacking | Cybrary (83)

Building a Security Team

June 27, 2023

Digital Forensics and Incident Response: What It Is, When You Need It, and How to Implement It

A quick guide to digital forensics and incident response (DFIR): what it is, when it’s needed, how to implement a cutting-edge program, and how to develop DFIR skills on your team.

Read More

Google Dorks: An Easy Way of Hacking | Cybrary (84)

Building a Security Team

June 28, 2023

How to Build a Red Team

An overview of what a red team is (and isn’t), and practical tips on how to build a Red Team and develop offensive security skills in your team.

Read More

Google Dorks: An Easy Way of Hacking | Cybrary (85)

Tools & Applications

June 7, 2023

How to Make the Most of Blending Learning with Cybrary Live

Learn how to get the most from your cybersecurity training platform by blending on-demand learning with virtual, live courses led by industry experts.

Read More

Google Dorks: An Easy Way of Hacking | Cybrary (86)

News & Events

June 7, 2023

Introducing the New Cybrary Learner Experience

Cybrary is launching a key update to the Cybrary Learner experience to elevate hands-on learning and measurement as guiding tenets of Cybrary’s mission.

Read More

(Video) | Google Dorks - How to hack using them |


Is Google Dork helpful for hacking? ›

Google dorks can reveal sensitive or private information about websites and the companies, organizations, and individuals that own and operate them. In preparing for an attack, malicious hackers might use Google dorks to gather data on their targets.

Is it legal to use Google dorking? ›

Thus, Google Dorking as a standalone act remains legal, but it could still facilitate crime resulting in criminal prosecution.

What is Google hacking commands? ›

Advanced search operators
Advanced OperatorDescription
link:Search for pages that link to the requested URL
cache:Search and display a version of a web page as it was shown when Google crawled it.
intitle:Search for a string text within the title of a page.
inurl:Search for a string within a URL
2 more rows

What are Google dork terms? ›

A: Google Dorks is a search technique that uses advanced operators to search for information that is not typically indexed by search engines. Hackers use it to find sensitive information stored on websites, such as passwords or credit card numbers.

What do professional hackers use to hack? ›

Some of the most famous hacking tools in the market are Nmap (Network Mapper), Nessus, Nikto, Kismet, NetStumbler, Acunetix, Netsparker, and Intruder, Nmap, Metasploit, Aircrack-Ng, etc.

What are the benefits of Google dorks? ›

Uses of Google Dorks: 1. Information Gathering: Google Dorks can help you locate specific strings of text within search results. For instance, it can find pages containing certain keywords, specific file types, and even certain website pages indexed by Google.


1. Top 7 Google Dorks of 2023 (Google HACKING)
(Cyber Studies)
2. Google Dorks For Penetration Testing
3. HakByte: How to find anything on the internet with Google Dorks
4. Google Hacking (Utilizing Google Dorks)
(Cyber Studies)
5. How to use Google dorks for hacking
6. [HINDI] Working with Google Dorks | Google Dorking Practical
(Bitten Tech)
Top Articles
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated: 29/09/2023

Views: 5767

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.