- For e.g. information about the target organization's employees, intranet, login pages...
- Sources include • social networking sites • people search services • alerting services • financial services • job sites showing target infrastructure details, physical location, and employee details • deep and dark web
-
Involves using a set of search operators (dorks) and building complex queries.
-
📝 Form of passive reconnaissance
-
Common dorks:
Dork Definition Example site
Only from the specified domain azure site:cloudarchitecture.io
inurl
Only pages that has the query in its URL. inurl: cloudarchitecture
intitle
Only pages that has the query in its title. intitle: cloud architecture
cache
Cached versions of the queried page cache:cloudarchitecture.io
link
Only pages that contain the queried URL. Discontinued. link:cloudarchitecture.io
filetype
Only results for the given filetype filetype:sql
-
📝 Usual to combine
filetype
andsite
dorks as see in metagoofil -
Google logical query operators
Operator Definition Example OR
, **``** X or Y but not both AND
Results related to both X and Y, google default. jobs AND gates
-
Exclude a term or phrase jobs ‑apple
*
Wildcard that will match any word or phrase. "Google * my life"
> google changed my life, google runs my life...(
,)
Group multiple terms (iPad OR iPhone) apple
-
E.g. finding passwords:
intext:"please change your" password | code | login file:pdf | doc | txt | docx -github
intext
: in the text of the website"please change your" password"
: Placing something in quote marks means it must contain the text as whole, not parts of it.file:pdf
: specify what kind of file you want.-github
: minus + word tells to exclude results containing that word(s).
-
For complex searches use:
- Google Advanced Search (no need for dorks)
- Google Advanced Image Search
-
💡 Easier way may be using Google Advanced Search or Advanced Image Search
- Google hack honeypot
- Logs google hacking queries against your resources
- Google hacking database
- Helps you with
- finding various types of files, including those that contain usernames and passwords.
- VoIP footprinting using e.g.
intitle:"D-Link VoIP Router" "Welcome"
to find pages containing D-Link login portals - VPN footprinting using e.g.
filetype:pcf "cisco" "GroupPwd"
to find Cisco VPN files with passwords
- 💡 Once you find password lists and you can guess similar ones as people usually have similar passwords.
- Helps you with
- Open-source tool to extract metadata of public documents (pdf,doc,xls,ppt,etc) available in the target websites
- Also helps with website footprinting
- Flow
- Queries Google for different filetypes that may have metadata
- Combining
site:
andfiletype
dorks
- Combining
- Downloads the documents to disk and extracts the metadata of the file
- Parses files using different libraries for metadata (e.g. Hachoir, pdfminer)
- Queries Google for different filetypes that may have metadata
- Searching domain gives you some data about e.g. IP address, server, geolocation.
- ❗Careful, can be fairly inaccurate, Generic results = No guarantee.
- Far better to do your own search
- Generic results = No guarantee
- ❗Careful, can be fairly inaccurate, Generic results = No guarantee.
- Website Watcher to get notified if a web page is changed.
- Allows tracking original source of an image
- E.g. • Google Image Search • TinEye Reverse Image Search • Yahoo Image Search
- Search video related to target and extract video information
- E.g. • YouTube • Google Videos
- Video analysis tools include • YouTube DataViewer • EZGif • VideoReverser.com,
- Uses other search engines to build meta data of Internet
- Can give more information such as images, videos, blogs, news, articles about target
- E.g. • Startpage • MetaGer
- Search files on FTP servers
- E.g. • NAPALM FTP Indexer • Global FTP Search Engine
- Can help to find tax documents, business strategies etc.
- Can allow finding e.g. manufacturer details, geographical location, IP address, hostname, open ports
- E.g. Shodan, Censys, and Thingful
- See Information Gathering | IoT security
- Online search engine
- Finds specific types of IoT (webcams, routers, servers, etc.) connected to the internet using a variety of filters.
- 📝 You can e.g. search for open ports
port: 1433
- Online censys
- 📝 Provides internet asset discovery i.e. scanning for unknown internet resources.
- Available on search.censys.io
- Allows you search web by domain (DNS) through search DNS service.
- Reports more information such as
- If it uses HTML5 or flash (flash has many vulnerabilities)
X-Frame-Options
: Do not allow this site to be rendered in an iframe- If it's allowed it allows for a phishing scheme such as clickjacking
- Helps you find IP addresses behind a CDN (e.g. CloudFlare)
- CDN: Protects against DDoS, geolocation of servers by having different IP address.
- People often use real IP addresses before CDN, you can then look at past DNS records to find it.