No announcement yet.


  • Filter
  • Time
  • Show
Clear All
new posts

  • Dorks:


    Dorks are used for computer hacking but they do not act to damage , They are not illegal. Dorks are search queries designed to return results that contain a certain code. I.e. a query that helps one find sites with potential vulnerabilities. They are also used for SQL Injecting.
    The Dorks are search queries.

    Search in google >> type " windows " (you get the result with the websites concern with windows)
    Search in google >> type " index.php?= " (you get the result with the URL of websites concern with exact name index.php? in the link)

    Google Dorks & Google Hacking
    Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking. Google dorks are the center of the Google Hacking.

    Example Dorks:-
    CGI directories contain scripts which can often be exploited by attackers.
    Type in the Google search ==> “index of cgi-bin”

    Another famous Google Dork is the PhpMyAdmin Dork. phpMyAdmin is a widly spread webfrontend used to mantain sql databases. The default security mechanism is to leave it up to the admin of the website to put a .htaccess file in the directory of the application. Well gues what, obviously some admins are either too lazy or don’t know how to secure their directories.

    Type in the Google search ==> “Welcome to phpMyAdmin” ” Create new database”
    This way you may find some vulnerable pages to gain access to someone’s PhpMyAdmin.

    For more details visit the google search engine and search for "google dorks", you need to to go throught the first received link for the same.

    Few Example to search dorks in are
    1. trainers.php?id=
    2. article.php?ID=
    3. Pageid=
    4. games.php?id=
    Check for the existance of these syntax in the links received.

    This is how the dorks work with the search engines to entertain the hacking stuff.

    Thanks and Regards,