Report
Issue
<-->
Add Dork
+-----------------------------------------------------------------------------+
| [!] Legal disclaimer: Usage of these dorks for attacking targets without |
| prior mutual consent is illegal. |
| It is the end user's responsibility to obey all applicable local, state and|
| federal laws. |
| Developers assume no liability and are not responsible for any misuse or |
| damage caused by this program |
+-----------------------------------------------------------------------------+
P.S- I have personally tested out these dorks
1."domain.com" security_credentials : LDAP(Active Directory) credentials
2."domain.com" connectionstring : Database Credentials
3."domain.com" JDBC : Database Credentials
4."domain.com" ssh2_auth_password : Unauthorized access to Servers
5."domain.com" send_keys or send,keys : LDAP(Active Directory) credentials
5."domain.com" Sensitive Data : Sensitive Information
5."domain.com" password : Passwords
5."domain.com" dbpassword : Database Passwords
5."domain.com" dbuser : Database User Names
5."domain.com" access_key : Access Key Credentials
5."domain.com" secret_access_key : Access Key Credentials
5."domain.com" bucket_password : Cloud Bucket credentials
5."domain.com" redis_password : Redis Passwords
5."domain.com" root_password : Root Password
5."domain.com" HOST=smtp.gmail.com : SMTP Sensitive Information
5."domain.com" filename:.htpasswd : Wordpress File to store Username and Password
5."domain.com" extension:sql mysql dump : MYSQL Dump Information
In case of different subdomains or according to your scope you can put * on that place i.e .domain.com or subdomain.domain. in place of "site" in the dorks given below.
1.site:domain.com intitle:"index of" "/configs" : Configuartion Files
2.site:domain.com allintext:username filetype:log : Log Files
3."site:domain.com" inurl:/proc/self/cwd : Vulnerable Web Server
4."site:domain.com" intitle:"index of" inurl:ftp : Open FTP Server
5."site:domain.com" intitle:"index of" inurl:env : Env Files
6."site:domain.com" intitle:index.of id_rsa -id_rsa.pub : SSH private keys
7."site:domain.com" filetype:xls inurl:"email.xls” : Email lists
8."site:domain.com" "index of" "database.sql.zip” : SQL Database Dumps
9."site:domain.com" intitle:"Index of" wp-admin : WordPress Admin
9."site:domain.com" intitle:"Apache2 Ubuntu Default Page: It works” : Apache2
9."site:domain.com" "Index of" inurl:phpmyadmin : PHPmyadmin
9."site:domain.com" inurl:Dashboard.jspa intext:"Atlassian Jira Project Management Software" : JIRA
9."site:domain.com" inurl:app/kibana intext:Loading Kibana : Kibana
1."site:domain.com" intitle:"index of" "WebServers.xml" : XML configuration file for Webserver Running
2."site:domain.com" filetype:xls inurl:"email.xls" : **Excel file containing emails, can display Company's internal member's emails **
3."site:domain.com" intitle:"Index of" wp-admin : WordPress Admin
4."site:domain.com" intitle:"index of" "admin/sql/" : SQL Database Files
5."site:domain.com" intitle:"index of" "system/config" : System Configuration Files
6."site:domain.com" index of /wp-content/uploads/ : WordPress Uploaded Files
7."site:domain.com" intext:"index of" "var/log/" : Logged Messages which can be cron jobs, daemon processes, kernel and auth logs
8."site:domain.com" intitle:"Dashboard [Jenkins]" : Open Jenkins Dashboard
9."site:domain.com" intitle:"index of" "shell.php" : Check for any Uploaded Shell
- is domainname down : Checking Whether Websites Are Down
- color codes : Hex color codes matched up with the corresponding colors
- html chars : List of the HTML codes for various special characters
- lowercase text-you-want-to-be-converted / uppercase text-you-want-to-be-converted : Switch Text Case
- qr domain-name : Generate QR Codes
- alternative to any-app-name : Find App Alternatives
- @profileidname : Find Social media bio without leaving profile
- expand short-link / shorten domain-name : Shorten and expand links
- stopwatch : quick stopwatch
- loan AMOUNT at INTEREST with PERCENT down for DURATION : Loan calculator
- site:domain.com /{payload}
- site:domain.com ?next={payload}
- site:domain.com ?url={payload}
- site:domain.com ?target={payload}
- site:domain.com ?rurl={payload}
- site:domain.com ?dest={payload}
- site:domain.com ?destination={payload}
- site:domain.com ?redir={payload}
- site:domain.com ?redirect_uri={payload}
- site:domain.com ?redirect_url={payload}
- site:domain.com ?redirect={payload}
- site:domain.com /redirect/{payload}
- site:domain.com /cgi-bin/redirect.cgi?{payload}
- site:domain.com /out/{payload}
- site:domain.com /out?{payload}
- site:domain.com ?view={payload}
- site:domain.com /login?to={payload}
- site:domain.com ?image_url={payload}
- site:domain.com ?go={payload}
- site:domain.com ?return={payload}
- site:domain.com ?returnTo={payload}
- site:domain.com ?return_to={payload}
- site:domain.com ?checkout_url={payload}
- site:domain.com ?continue={payload}
- site:domain.com ?return_path={payload}
- "default password" org:Organization Name
- "230 login successful" port:"21" org:Organization Name
- vsftpd 2.3.4 port:21 org:Organization Name
- 230 'anonymous@' login ok org:Organization Name
- guest login ok org:Organization Name
- country:EU port:21 -530 +230 +Organization Name
- country:IN port:80 title:protected org:Organization Name
- net: IP_ADDR product:elastic
- net: IP_ADDR port:9200 user
- port:"9200" all:''elastic indices
- port:27017 -all:"partially" all:''fs.files
- Industrial Control System(ICS)
- Remote Desktop
- Network Infrastructure
- Network Attached Storage
- Webcams
- Printers
- Home Devices
- Random Stuff
ICS
- "Server: Prismview Player" : ICS
- "in-tank inventory" port:10001 : Gas Station Pump Controller
- P372 "ANPR enabled" : Automatic License Plate Readers
- mikrotik streetlight : Traffic Light Controllers / Red Light Cameras
- "voter system serial" country:US : Voting Machines in the United States
- "Cisco IOS" "ADVIPSERVICESK9_LI-M" : Telcos Running Cisco Lawful Intercept Wiretaps
- "[2J[H Encartele Confidential" : Prison Pay Phones
- http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2 : Tesla PowerPack Charging Status
- "Server: gSOAP/2.8" "Content-Length: 583" : Electric Vehicle Chargers
- "Cobham SATCOM" OR ("Sailor" "VSAT") : Maritime Satellites
- title:"Slocum Fleet Mission Control" : Submarine Mission Control Dashboards
- "Server: CarelDataServer" "200 Document follows" : CAREL PlantVisor Refrigeration Units
- http.title:"Nordex Control" "Windows 2000 5.0 x86" "Jetty/3.1 (JSP 1.1; Servlet 2.2; java 1.6.0_14)" : Nordex Wind Turbine Farms
- "[1m[35mWelcome on console" : C4 Max Commercial Vehicle GPS Trackers
- "DICOM Server Response" port:104 : DICOM Medical X-Ray Machines
- "Server: EIG Embedded Web Server" "200 Document follows" : GaugeTech Electricity Meters
- "Siemens, SIMATIC" port:161 : Siemens Industrial Automation
- "Server: Microsoft-WinCE" "Content-Length: 12581" : Siemens HVAC Controllers
- "HID VertX" port:4070 : Door / Lock Access Controllers
- "log off" "select the appropriate" : Railroad Management
Remote Desktop
- "authentication disabled" "RFB 003.008" : Unprotected VNC
- "\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00" : Windows RDP
- title:"Weave Scope" http.favicon.hash:567176827 : Weave Scope Dashboards
- "MongoDB Server Information" port:27017 -authentication : MongoDB
- "Set-Cookie: mongo-express=" "200 OK" : Mongo Express Web GUI
- "X-Jenkins" "Set-Cookie: JSESSIONID" http.title:"Dashboard" : Jenkins CI
- "Docker Containers:" port:2375 : Docker APIs
- "Docker-Distribution-Api-Version: registry" "200 OK" -gitlab : Docker Private Registries
- "dnsmasq-pi-hole" "Recursion: enabled" : Pi-hole Open DNS Servers
- "root@" port:23 -login -password -name -Session : Already Logged-In as root via Telnet
- "Android Debug Bridge" "Device" port:5555 : Android Root Bridges
- Lantronix password port:30718 -secured : Lantronix Serial-to-Ethernet Adapter Leaking Telnet Passwords
- "Citrix Applications:" port:1604 : Citrix Virtual Apps
- "smart install client active" : Cisco Smart Install
- PBX "gateway console" -password port:23 : PBX IP Phone Gateways
- http.title:"- Polycom" "Server: lighttpd" : Polycom Video Conferencing
- "Polycom Command Shell" -failed port:23 : Telnet Configuration
- "Server: Bomgar" "200 OK" : Bomgar Help Desk Portal
- "Intel(R) Active Management Technology" port:623,664,16992,16993,16994,16995 : Intel Active Management CVE-2017-5689
- HP-ILO-4 !"HP-ILO-4/2.53" !"HP-ILO-4/2.54" !"HP-ILO-4/2.55" !"HP-ILO-4/2.60" !"HP-ILO-4/2.61" !"HP-ILO-4/2.62" !"HP-iLO-4/2.70" port:1900 : HP iLO 4 CVE-2017-12542
Outlook Web Access
- "x-owa-version" "IE=EmulateIE7" "Server: Microsoft-IIS/7.0" : Exchange 2007
- "x-owa-version" "IE=EmulateIE7" http.favicon.hash:442749392 : Exchange 2010
- "X-AspNet-Version" http.title:"Outlook" -"x-owa-version" : Exchange 2013 / 2016
- "X-MS-Server-Fqdn" : Lync / Skype for Business
Network Attached Storage
- "Authentication: disabled" port:445 : SMB (Samba) File Shares
- "Authentication: disabled" NETLOGON SYSVOL -unix port:445 : Specifically domain controllers
- "Authentication: disabled" "Shared this folder to access QuickBooks files OverNetwork" -unix port:445 : Concerning default network shares of QuickBooks files
- "220" "230 Login successful." port:21 : FTP Servers with Anonymous Login
- "Set-Cookie: iomega=" -"manage/login.html" -http.title:"Log In" : Iomega / LenovoEMC NAS Drives
- Redirecting sencha port:9000 : Buffalo TeraStation NAS Drives
- "Server: Logitech Media Server" "200 OK" : Logitech Media Servers
- "X-Plex-Protocol" "200 OK" port:32400 : Plex Media Servers
- "CherryPy/5.1.0" "/home" : Tautulli / PlexPy Dashboards
Webcams
- "Server: yawcam" "Mime-Type: text/html" : Yawcams
- ("webcam 7" OR "webcamXP") http.component:"mootools" -401 : webcamXP/webcam7
- "Server: IP Webcam Server" "200 OK" : Android IP Webcam Server
- html:"DVR_H264 ActiveX" : Security DVRs
Printers
- "Serial Number:" "Built:" "Server: HP HTTP" : HP Printers
- ssl:"Xerox Generic Root" : Xerox Copiers/Printers
- "SERVER: EPSON_Linux UPnP" "200 OK" : Epson Printers
- "Server: EPSON-HTTP" "200 OK" : Epson Printers
- "Server: KS_HTTP" "200 OK" : Canon Printers
- "Server: CANON HTTP Server" : Canon Printers
Home Devices
- "Server: AV_Receiver" "HTTP/1.1 406" : Yamaha Stereos
- "\x08_airplay" port:5353 : Apple TVs, HomePods, etc.
- "Chromecast:" port:8008 : Chromecasts / Smart TVs
- "Model: PYNG-HUB" : Crestron Smart Home Controllers
Misc
- title:"OctoPrint" -title:"Login" http.favicon.hash:1307375944 : OctoPrint 3D Printer Controllers
- "ETH - Total speed" : Etherium Miners
- http.title:"Index of /" http.html:".pem" : Apache Directory Listings
- http.html:"* The wp-config.php creation script uses this file" : Misconfigured Wordpress
- "Minecraft Server" "protocol 340" port:25565 : Minecraft Servers
- net:175.45.176.0/22,210.52.109.0/24,77.94.35.0/24 : Information related to North Korea
- port:17 product:"Windows qotd" : Quote of the day protocol
- "X-Recruiting:" : Finding a Job
- geo:"56.913055,118.250862" : Find devices by giving geographical coordinates
- server: "gws" hostname:"google" : Find devices matching the hostname.
- net:210.214.0.0/16 : Find devices based on an IP address or /x CIDR
- os:"windows 7" : Find devices based on operating system
- proftpd port:21 : Find devices based on open ports
- apache after:22/02/2009 before:14/3/2010 : Find devices before or after between a given time
- title:"citrix gateway" : Find Citrix Gateway
- html:"def_wirelesspassword" : Helps to find the cleartext wifi passwords in Shodan
- NETSurveillance uc-httpd : Surveillance Cams with username:admin and password
- "privileged command" GET : No auth required to access CLI terminal
- hacked-router-help-sos : Routers which got compromised
- NCR Port:"161" : May allow for ATM Access availability
Youtube
- Use # before any organisation name or any name which you want to search like #name or #orgname.
- Try to use the filters given under Search field as "Filters" and narrow down your scope.
- Upload date is a very useful filter while doing investigations.
- You can change your search to look for Channel, Playlist, Movie, or Show content instead.
- Use of "" in search fields and use the keywords inside the quotes. You would get the keywords in title of Videos and Channel Names.
- If you want to search a query and add an additional query then you can search like "keyword + additional keyword".
- If you want to exclude items from search then use the "-" operator and the keyword. Example: tennis -london (so it will remove the keyword "london" from the search).
- Add a wildcard (*) if you want to know all content related to that keyword like *keyword.