From the course: Deep Dive into Open-Source Intelligence
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Google hacking or dorking for OSINT
From the course: Deep Dive into Open-Source Intelligence
Google hacking or dorking for OSINT
- The information security term Google Dorking or Google Hacking, has been around for a while and involves using advanced operators in search engines such as Google, to find specific OSINT information. One of my favorite examples of Google Hacking is using the search operator's site and filetype, followed by a colon and then the URL and file extension. Say you wanted to locate all the PDF or Microsoft Word documents indexed on the target's website. The Google search would look something like this. site:linkedin.com.filetype.PDF or, site:linkedin.com.filetype:docx. There are many websites such as the Google Hacking database, that provide an index of search queries used to find publicly available information. You'll find queries that will return things like files containing usernames, sensitive directories, and vulnerable files. And some of the queries listed on the Google Hacking Database truly are masterpieces. For those…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Introducing domain names and DNS discovery2m 41s
-
(Locked)
Crawling websites to gather OSINT data3m 20s
-
(Locked)
Finding deleted information in web archives2m 9s
-
(Locked)
Introduction to using search engines for OSINT2m 11s
-
(Locked)
Google hacking or dorking for OSINT2m 22s
-
(Locked)
Discovering OSINT data in the dark web3m 7s
-
(Locked)
Introduction to RIRs2m 46s
-
(Locked)
-