Google Dorks

Google dorks, also known as Google hacking, is a technique used to search for vulnerabilities in websites and applications by using specific search queries in the Google search engine. Here are the steps to use Google dorks for enumeration on the domain "example.com":

  1. Start by identifying the target domain: In this case, the target domain is "example.com".

  2. Formulate a Google search query: The query should be crafted in such a way that it returns relevant information about the target domain. For example, the following query can be used to search for sensitive information such as login pages, email addresses, and confidential documents related to the domain "example.com":

site:example.com intitle:"login" OR intitle:"email" OR intitle:"restricted" OR intitle:"confidential"

  1. Execute the search query: Go to Google and paste the query in the search bar, then press "Enter" to execute the search.

  2. Analyze the results: Review the results of the search query and look for any relevant information that can be used for enumeration. Some of the information you can find includes login pages, email addresses, and confidential documents related to the target domain.

  3. Repeat the process: Repeat the above steps and formulate different search queries to find more information about the target domain.

You can find more examples of dorks on the link below:

https://www.exploit-db.com/google-hacking-database

Last updated