Google hacking
Google hacking, also named Google dorking,[1][2] is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using.
Basics
Google hacking involves using operators in the Google search engine to locate specific sections of text on websites that are evidence of vulnerabilities, for example specific versions of vulnerable Web applications. A search query with intitle:admbook intitle:Fversion filetype:php
would locate PHP web pages with the strings "admbook" and "Fversion" in their titles, indicating that the PHP based guestbook Admbook is used, an application with a known code injection vulnerability. It is normal for default installations of applications to include their running version in every page they serve, for example, "Powered by XOOPS 2.2.3 Final", which can be used to search for websites running vulnerable versions.
Devices connected to the Internet can be found. A search string such as inurl:"Mode="
will find public web cameras.
Protection
Robots.txt is a well known file for search engine optimization and protection against Google dorking. It involves the use of robots.txt to disallow everything or specific endpoints (hackers can still search robots.txt for endpoints) which prevents Google bots from crawling sensitive endpoints such as admin panels.
References
- ^ "Term Of The Day: Google Dorking - Business Insider". Business Insider. Archived from the original on June 19, 2020. Retrieved January 17, 2016.
- ^ Google dork query Archived January 16, 2020, at the Wayback Machine, techtarget.com
External links
- "Google Hacking: .pdf Document", boris-koch.de (printable, .pdf)
- "Google Help: Cheat Sheet", Google (printable)
- Google Hacking for Penetration - Using Google as a Security Testing Tool, Introduction by Johnny Long
- Search Engine- Google Dorking Search Engine, for newbies.