Table of Contents
How to Use Google for Hacking Websites, Databases & Cameras? A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website.
Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected.
As a passive attack method, Google dorking can return usernames and passwords, email lists, sensitive documents, personally identifiable financial information (PIFI) and website vulnerabilities. That information can be used for any number of illegal activities, including cyberterrorism, industrial espionage, identity theft and cyberstalking.
This article is only for educational purpose. You can use this knowledge to increase your system’s security or for any ethical purpose.
Hack Search Terms
define:”sql syntax error”
intitle: index of mp3
intitle: “index of avi” intext: “movie name”
Finding Username & Passwords
intext: passwords filetype: txt
mysql history files
intext: account details filetype: txt
intitle:index.of intext:”secring .skr”|&q…
htpasswd / htpasswd.bak
htpasswd / htgroup
spwd.db / passwd
passwd / etc (reliable)
Finding Public and Private Camera
intitle:”Live View / – AXIS
inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
intitle:”live view” intitle:axis
allintitle:”Network Camera NetworkCamera” (disconnected)
intitle:axis intitle:”video server”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
Please Like, Share and Comment your valuable thoughts 🙂
Thanks for patronizing Ultimate Tech. This post is about, "How to Use Google for Hacking Websites, Databases & Cameras?". I am sure your visit to us must be quite satisfying and in line with your expectations from us. Just in case, it’s not as you expected from us or if you are facing any problem, kindly forward your feedback’s directly to us by leaving a Comment below. And, get assured response from my side. Your feedback’s and suggestions are extremely valuable to us. This Post is written by the team of Ultimate Tech. There is not any source, if any, then already mentioned so Copying or using this post’s content for your own site is not allowed. If anyone do so, get ready for facing DMCA. Please, if you like this post then share on your social networking sites. Assuring you of our best service always.