0% found this document useful (0 votes)
18 views

Understand How Dorks Work

The document provides an introduction to using dorks to find vulnerable websites and extract database information. It explains what dorks are, how they are constructed, and how parameters, page types, search functions, and domain extensions are used to find specific websites. The goal is to educate beginners on using dorks to locate and obtain database content like emails, passwords, and personal information from insecure sites.

Uploaded by

testmega355
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Understand How Dorks Work

The document provides an introduction to using dorks to find vulnerable websites and extract database information. It explains what dorks are, how they are constructed, and how parameters, page types, search functions, and domain extensions are used to find specific websites. The goal is to educate beginners on using dorks to locate and obtain database content like emails, passwords, and personal information from insecure sites.

Uploaded by

testmega355
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

firstly i see every cracking guide, books, pdf, video, all are incomplete there are

not well explained


so today i decided to make very basic and easy to understandable guide for beginers
so let's start shall we
first step is understanding basic Q&A
1)what is dorks ?
-Dorks is used to find vulnerabilities, hidden information and access pages on
certain
websites. Because every search engine has searching algorithm and indexes most
websites,
it can be useful to a hacker to find vulnerabilities on the target.
2)how dorks are made ?
-combination of keyword , page formats , page types , search function and domain
extentions
3)why dork used for ?
-dork is used for hacking or targeting vulnerable sites for database
4)what is page parameter
-parameters whose values are set dynamically in a page�s URL, and can be
accessed by its template and its data sources

5)what is page types


-it is used for searching pages on site
6)what is search function (called as Advanced operators)
-There are many similar search function (advanced operators) which can be used to
exploit insecure websites
7)why domain extentions is used
-because used for getting specific country sites
8)what we will find using dorks
-we will get site database ( database content - emails , passwords, bank accounts ,
personal information,)
(!-- why i do firstly Q&A because Q&A is better to understand basic things --)
(!-- please like our thread so i feel great for my hardwork xD--)
dork is used to search vulnerable sites and dump site database for profit or etc.
keyword is normally used for finding sites but dork make them better to finding
vulnerable sites
(vulnerable mean sites database is exposed or it can be hacked)
simple dork
example. rexio.php? user_id=
why we used page format .php? because backend is this part of website capable of
access to database
conditional logic and putting everything in the right place of html code.
the page ID is the number in the URL. this URL tells us that the page being edited
has an ID number of 61.
There are many similar search function (advanced operators) which can be used to
exploit insecure websites
domain extentions is used for getting specific country sites if we got specific
country sites then we will
get specific sites database.
mostly people don't do research on search engine because they don't know why
getting they bad result
every search engine is usefull for grabbing links, every search engine have own
basics searching
and finding terms or sites. mostly used search engine is google so we need figure
it out
we will learn how to make good dorks, understanding every search engine work

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy