Bug Bounty for Beginners - Reference Little Book
  • 📘Little Bug Bounty Book
  • ❓What is Bug Bounty
  • 🎯Bug Bounty Platforms
  • 🪜Phases of Bug Hunting
  • ⚠️Required Knowledge
  • 📣So, where do I start?
    • Network Security
    • Application Security
    • Mobile Security
    • Code Review and SAST
    • OWASP?
  • 🔎Reconnaissance Phase
    • Footprinting
      • OSINT
      • Google Dorks
      • Censys
      • Shodan
    • Subdomain Enumeration
      • Amass
      • Subfinder
      • Assetfinder
      • Aquatone
      • DNSrecon
      • DNSEnum
      • HTTPX
      • ReconFTW
    • Fingerprint
      • Nmap
      • Rustscan
      • Masscan
  • 🐞Scanning Phase
    • OpenVAS
    • Nuclei
    • OWASP Zap
    • NMAP
    • Looking for Parameters with Katana
    • Searching for XSS
    • SQL Injection (SQLi)
  • ♨️Testing Phase
    • Manual Validation
    • Severity Assessment in Vulnerability Testing
    • Exploitation Phase
    • Documentation of Findings
  • 📖Reporting Phase
Powered by GitBook
On this page
  1. Reconnaissance Phase
  2. Footprinting

Google Dorks

PreviousOSINTNextCensys

Last updated 2 years ago

Google dorks, also known as Google hacking, is a technique used to search for vulnerabilities in websites and applications by using specific search queries in the Google search engine. Here are the steps to use Google dorks for enumeration on the domain "example.com":

  1. Start by identifying the target domain: In this case, the target domain is "example.com".

  2. Formulate a Google search query: The query should be crafted in such a way that it returns relevant information about the target domain. For example, the following query can be used to search for sensitive information such as login pages, email addresses, and confidential documents related to the domain "example.com":

site:example.com intitle:"login" OR intitle:"email" OR intitle:"restricted" OR intitle:"confidential"

  1. Execute the search query: Go to Google and paste the query in the search bar, then press "Enter" to execute the search.

  2. Analyze the results: Review the results of the search query and look for any relevant information that can be used for enumeration. Some of the information you can find includes login pages, email addresses, and confidential documents related to the target domain.

  3. Repeat the process: Repeat the above steps and formulate different search queries to find more information about the target domain.

You can find more examples of dorks on the link below:

🔎
https://www.exploit-db.com/google-hacking-database