How to Find Passwords in Exposed Log Files with Google Dorks (2024)

You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to see.

The advanced application of Google search operators is Google Dorking — using search operators to hunt for specific vulnerable devices through targeted search strings. If we assume that Google has indexed most devices accidentally exposed to the internet, we can use the text we know appears in their login or administrative pages to find them.

What Kinds of Things Do Dorks Connect to the Internet?

You would be amazed. Everything from the pool controller of Yachts in the ocean to configuration interfaces for critical systems is connected to the internet by well-meaning people with the assumption that no one will ever find them.

So how could this happen to you? Imagine getting a new security camera that provides the ability to watch it on your phone whenever you want. You set it up, connect it to your Wi-Fi, and download an app that asks for you to sign in. After that, you can access your camera from anywhere!

What's going on in the background isn't so simple. The camera calls a Chinese server and streams video in real-time, allowing you to log in by accessing the video feed hosted on the server in China from your phone. That server may require no password to access the feed from your webcam, making your camera accessible to anyone who searches for text contained in the viewing page of the camera.

Unfortunately, Google is ruthlessly effective at hunting down any devices on the internet running HTTP and HTTPS servers. Because most of these devices host a server to configure them, it means that many things that aren't supposed to be on Google end up there.

Which Dorks Are the Most Powerful?

By far, the most severe kind of exposed file we can find is one that leaks the credentials to user accounts or the entire service itself. Usually, this will happen in one of two ways. In the first, a server or other service is set up incorrectly and exposes its administrative logs to the internet. When passwords are changed, or a user fails to log in correctly, these logs can leak the credentials being used to the internet.

The other way this happens is when configuration files that contain the same information are exposed. These are files that are supposed to be internal but are often leave critical information out in the open. Either one of these mistakes can cause the entire service to be taken over by an attacker who happens to chance upon the information.

We'll be using Google dorks to find not only these files, but also things like file transfer servers that may contain interesting information, email lists, and my personal favorite, exposed webcams.

What You'll Need

To follow along, you'll need a browser with internet access. The beautiful thing about using Google dorks is that we can use tools accessible by nearly anyone to find vulnerable systems.

Once you have a browser open, navigate to Google.com, and we can get started.

Step 1: Finding FTP Servers & Websites Using HTTP

To start, we'll use the following dork to search for file transfer servers published sometime this year. Searching for these servers can allow us to find files that are supposed to be internal, but were unknowingly made public.

intitle:"index of" inurl:ftp after:2018

These servers become public because the index file of their FTP server is the kind of data that Google loves to scan — a fact people tend to forget. Google's scanning leads to a complete list of all the files contained within the server being searchable on Google.

If we want to find insecure webpages still using HTTP to poke at, we can modify the command slightly to do so by changing the "ftp" to "http" and re-running the search.

intitle:"index of" inurl:http after:2018

Searching that string should produce a list of lots and lots of websites using HTTP, ready to be attacked. But if we're looking for a specific type of site, we can go even further.

If we want to start attacking some easy targets, we can be more specific and search for online forms still using HTTP by changing the text in the search title.

intitle:"forum" inurl:http after:2018

We can keep adding search operators like AND inurl:"registration" to get more specific and hunt down the registration pages of insecure form websites.

How to Find Passwords in Exposed Log Files with Google Dorks (2)

Here you can see we've found a list of vulnerable online forums using HTTP.

Step 1: Find Log Files with Passwords

The next step will be to search for files of the .LOG type. Searching for LOG files will allow us to look for clues about what the credentials to the system or various user or admin accounts might be.

The dork we'll be using to do this is as follows.

allintext:password filetype:log after:2018

When searching for current log files exposed to the internet, we find this almost immediately.

How to Find Passwords in Exposed Log Files with Google Dorks (3)

This log states that the password is the default one, which takes just a simple Google search of the OpenCast Project website to discover. With one search, we've possibly found the credentials to this system without hacking anything at all.

Step 2: Find Configuration Files with Passwords

Configuration files should not be public pretty much ever, and .ENV files are great examples of this. If we search for .ENV files that contain a string for the database password, we instantly find the password to this database we've discovered.

filetype:env "DB_PASSWORD" after:2018
How to Find Passwords in Exposed Log Files with Google Dorks (4)

If we remove the after:2018 we can see older log files also exposing services to the internet.

Step 3: Find Email Lists

Email lists are a great way of scraping email addresses and trying to find information on corporate or school targets. These lists are frequently exposed by companies or schools that are trying to organize email lists for their members.

To find them, we'll be looking for spreadsheet .XLS file type with the string "email.xls" in the URL.

How to Find Passwords in Exposed Log Files with Google Dorks (5)

While these results are useful, be careful not to download any file without first considering if it's a honeypot. Many people will take popular dorks and then leave a server hosting a file that looks vulnerable but could instead contain malware.

Step 4: Find Open Cameras

Finally, if you thought Shodan was the only service that can find weird open cameras, you were dead wrong. Camera login and viewing pages are usually HTTP, meaning Google is happy to index them and provide them for viewing if you know the right search string.

One common format for webcam strings is searching for "top.htm" in the URL with the current time and date included. You'll find a lot of results this way.

inurl:top.htm inurl:currenttime
How to Find Passwords in Exposed Log Files with Google Dorks (6)

The first result is a webcam that appears to be the Windows XP background from another angle in Belmullet, Ireland.

How to Find Passwords in Exposed Log Files with Google Dorks (7)

Another dork for cameras that produces outstanding results searches for a common live-view page hosted on routers.

inurl:"lvappl.htm"

Using this dork, I was able to locate the best camera of all, the birdcam1.

How to Find Passwords in Exposed Log Files with Google Dorks (8)

Please do not hack the bird cam, but feel free to enjoy it here. Many other cameras are available, though all are less interesting than birdcam1.

How to Find Passwords in Exposed Log Files with Google Dorks (9)

Many cameras also monitor inside factories or industrial areas.

How to Find Passwords in Exposed Log Files with Google Dorks (10)

While you can view the cameras I demonstrated without a password; many dorks look for webcam login pages that have a well-known default password. This tactic, while illegal, allows easy access to many webcams not intended for public viewing.

Google Dorks Allow Easy Hacking of Exposed Services

Thanks to the way Google indexes nearly everything connected to the internet that offers a web interface, there's no shortage of misconfigured services that leave critical elements exposed to the internet. Make sure you don't log in to any of these services even if the password is exposed, as this could get you into trouble because you don't have permission. If you have a service online, it's smart to run a few common dorks on your domains to see what turns up, just in case you've accidentally left something exposed that a hacker might find useful.

I hope you enjoyed this guide to using Google dorks to find vulnerable devices and passwords! If you have any questions about this on Google dorks, or if you have a comment, ask below or feel free to reach me on Twitter @KodyKinzie.

Just updated your iPhone? You'll find new features for Podcasts, News, Books, and TV, as well as important security improvements and fresh wallpapers. Find out what's new and changed on your iPhone with the iOS 17.5 update.

Cover photo and screenshots by Kody/Null Byte
How to Find Passwords in Exposed Log Files with Google Dorks (2024)

FAQs

What is a Google dork for passwords? ›

A: A Google Dork uses special search operators to make searches more precise. For example, to find usernames and passwords you would use a Google Dork with the search terms “inurl:username” and “inurl:password”. Q: Are Google Dorks only useful for finding usernames and passwords? A: No!

What information is sensitive to Google dork? ›

Sensitive information such as email addresses, . env files, SSH private keys, and details of FTP servers can be uncovered using Google Dorking. It has even been used by cybercriminals to access webcams, failed login attempts, and bypass login portals, highlighting its ability to penetrate security measures.

What is the filetype command in Google Dorking? ›

Filetype: The filetype: dork restricts the returned web addresses to the designated file type, such as PDF or XLS. Unlike most other dorks, it requires additional keywords/dorks in the search bar, or it'll return no results. The Google search results have the designated file type.

What can you find with Google Dorks? ›

The technique can reveal sensitive information that is unintentionally made public, leading to serious privacy violations. For instance, a malicious actor could use Google Dorking to discover unprotected databases, server credentials, or private documents that were not intended to be publicly accessible.

Is Google Dork legal? ›

Is Google dorking illegal? Google dorking is completely legal — it's just another form of searching after all. Google was built to handle advanced searches, and banning this functionality would limit information access.

What data can we find using Google Dorks? ›

A Google Dork is a special search term. These terms, when used with regular search keywords, can help us discover hidden resources crawled by Google. These resources include sensitive information such as usernames, passwords, credit card numbers, email addresses, shell scripts, user accounts, and so on.

What is the Google Dork query? ›

Google dorks, or Google hacks, are specific search queries that you type in the Google search. In return, Google presents you with targeted search results. With Google dorks, you can search for key phrases or topics in specific websites, find specific file types, cached versions of web pages, and more.

Which things are not allowed to search in Google? ›

​We don't allow content that primarily facilitates the promotion or sale of regulated goods and services such as alcohol, gambling, pharmaceuticals, unapproved supplements, tobacco, fireworks, weapons, or health and medical devices.

What is the name of Google Dork search? ›

Google Dork is a search query that we give to Google to look for more granular information and retrieve relevant information quickly. For example, try to search for your name and verify results with a search query [inurl:your-name].

How do I search all files of a type? ›

Search by file type

You can use the filetype: operator in Google Search to limit results to a specific file type or file extension. For example, filetype:rtf galway will search for RTF files and URLs ending in .

What does InURL do? ›

The InURL search query is one of Google's Search Operators intended to allow users to filter down the results. It can be used quite simply by entering "inurl:" followed by the search criteria, and can be combined as part of a site search to only include results from one website or domain.

What is the Google search trick for file type? ›

To search for a particular file format, simply include filetype: followed by the desired extension in your search query, then add your search term or keyword. For instance, if you need fitness-related PDFs, use the query filetype:pdf fitness to find relevant PDF files on that topic.

What are Google Dorks for sensitive files? ›

Google Dorks, or Google hacking or Google-fu, refers to specialized search queries that utilize advanced operators to pinpoint specific information on the web. These operators allow users to narrow down their searches and find hidden data that may not be accessible through our regular search methods.

What browser is best for Google dorking? ›

To protect you in your research, we recommend using the Tor Browser or Tails (an operating system that routes all internet traffic through the Tor anonymity network) when Google dorking on any search engine.

What is GHDB dorks? ›

The Google Hacking Database (GHDB), also known as Google Dorks or Google Hacking, is a collection of advanced search queries and techniques to uncover hidden, vulnerable, or sensitive information that may be inadvertently exposed on the web.

Does Google have a password keeper? ›

Google Password Manager makes it simple to use a strong, unique password for all your online accounts. When you use Google Password Manager, you can save passwords in your Google Account or on your device.

Is Google Chrome safe for passwords? ›

Google never learns your usernames or passwords during this process. When you use Chrome to sign in to a website, Chrome encrypts your username and password with a secret key known only to your device.

Can someone steal Chrome passwords? ›

Passwords saved on your web browser are prone to hacking. Here's what you can do to keep your data safe. Passwords stored on web browsers can be easily stolen by a malware called Redline Stealer.

Top Articles
Taco Soup Recipe (Ready in 30 Minutes!) - Flavor Ful Craving
29 Thinly Sliced Chicken Breast Recipes
Cappacuolo Pronunciation
What spices do Germans cook with?
Repentance (2 Corinthians 7:10) – West Palm Beach church of Christ
Manhattan Prep Lsat Forum
Notary Ups Hours
Bluegabe Girlfriend
Bank Of America Appointments Near Me
Back to basics: Understanding the carburetor and fixing it yourself - Hagerty Media
Lesson 1 Homework 5.5 Answer Key
Caresha Please Discount Code
Shuiby aslam - ForeverMissed.com Online Memorials
Shooting Games Multiplayer Unblocked
Summer Rae Boyfriend Love Island – Just Speak News
2021 Lexus IS for sale - Richardson, TX - craigslist
Nwi Arrests Lake County
Eka Vore Portal
Foodland Weekly Ad Waxahachie Tx
Maplestar Kemono
Tcu Jaggaer
9044906381
Kountry Pumpkin 29
Outlet For The Thames Crossword
Apple Original Films and Skydance Animation’s highly anticipated “Luck” to premiere globally on Apple TV+ on Friday, August 5
Free Personals Like Craigslist Nh
Play It Again Sports Norman Photos
Weve Got You Surrounded Meme
Phantom Fireworks Of Delaware Watergap Photos
Klsports Complex Belmont Photos
Churchill Downs Racing Entries
Black Panther 2 Showtimes Near Epic Theatres Of Palm Coast
Osrs Important Letter
Till The End Of The Moon Ep 13 Eng Sub
Imagetrend Elite Delaware
Club Keno Drawings
Graphic Look Inside Jeffrey Dresser
Consume Oakbrook Terrace Menu
Academic important dates - University of Victoria
Dmitri Wartranslated
Ticket To Paradise Showtimes Near Regal Citrus Park
Easy Pigs in a Blanket Recipe - Emmandi's Kitchen
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
Directions To The Closest Auto Parts Store
Smite Builds Season 9
Quiktrip Maple And West
Sechrest Davis Funeral Home High Point Nc
My Gsu Portal
Jackerman Mothers Warmth Part 3
Mmastreams.com
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Sunset On November 5 2023
Latest Posts
Article information

Author: Terence Hammes MD

Last Updated:

Views: 6443

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Terence Hammes MD

Birthday: 1992-04-11

Address: Suite 408 9446 Mercy Mews, West Roxie, CT 04904

Phone: +50312511349175

Job: Product Consulting Liaison

Hobby: Jogging, Motor sports, Nordic skating, Jigsaw puzzles, Bird watching, Nordic skating, Sculpting

Introduction: My name is Terence Hammes MD, I am a inexpensive, energetic, jolly, faithful, cheerful, proud, rich person who loves writing and wants to share my knowledge and understanding with you.