The Best way to Google Dork in Cybersecurity

Google Dorking in Cybersecurity

Basic Concepts

What is Google Dorking?

Most Valuable Dorks

Logical Operators

Use Cases

OSINT

allintext:"John Doe" & site:linkedin.com
site:arxiv.org filetype:pdf
"John Doe" filetype:docx

Penetration Testing

Automation

First Scripts

python3 -m pip install googlesearch-python
from googlesearch import search

j = search("netlas", advanced=True)

for i in j:
    print(i)

Complex Patterns

Input/Output

Domain_Name_1:       
  | Search_Pattern_1:        
      | URL_1: Description_1         
      | URL_2: Description_2        
      ...         
      | URL_k: Description_k         
  | Search_Pattern_2:        
      | ...           
Domain_Name_2:
  | ...

Main Request Function

def oneRequest(query, count):
    responseDict = {}

    j = search(query, advanced=True, num_results=count)

    for i in j:
        responseDict[i.url] = i.description

    return responseDict

Queries Hub

def functionHub(site, resultsCount):
    domainDict = {}

    domainDict["API Endpoints"] = copy.deepcopy(oneRequest("site:" + site + " inurl:api | site:*/rest | site:*/v1 | site:*/v2 | site:*/v3", resultsCount))
    time.sleep(10)
    #...

    return domainDict

Fighting Blockages

from googlesearch import search

proxy = '@proxy.host.com:8080/'

j = search("proxy test", num_results=100, lang="en", proxy=proxy, ssl_verify=False)
for i in j:
    print(i)

Final

Additional Capabilities

Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *