Footprinting using Advanced Google Hacking Techniques

Subscribe to my newsletter and never miss my upcoming articles

Listen to this article

Google Advanced Search Operators Some advanced options can be used to search for a specific topic using search engines. These Advance search operators made the searching more appropriate and focused on a certain topic. Advanced search operators by google are: -

Advanced Search Operators

Description

site :

Search for the result in the given domain

related :

Search for Similar web pages

cache :

Display the web pages stored in Cache

link :

List the websites having a link to a specific web page

allintext :

Search for websites containing a specific keyword

intext :

Search for documents containing a specific keyword

allintitle :

Search for websites containing a specific keyword in the title

intitle :

Search for documents containing a specific keyword in the title

allinurl :

Search for websites containing a specific keyword in URL

inurl :

Search for documents containing a specific keyword in URL

Table- Google Advanced Search Operators

For Google Advanced Search, you can also go to the following URL:

google.com/advanced_search

Google Hacking Database (GHDB) Google hacking, Google Dorking is a combination of computer hacking techniques that find the security holes within an organization's network and systems using Google search and other applications powered by Google. Google Hacking popularized by Johnny Long. He categorized the queries in a database known as Google Hacking Database (GHDB). This categorized database of queries is designed to uncover the information. This information might be sensitive and not publicly available. Google hacking is used to speed up searches. As shown in the figure, through exploit-db.com, you can search for GHDB or browse the category of GHDB. Similarly, hackersforcharity.org is also an online platform for GHDB.

Enter the following URL:

exploit-db.com/google-hacking-database

Google hacking databases provide the updated information that is useful for exploitation such as footholds, sensitive directories, vulnerable files, error messages, and much more.

 
Share this