Google Dorks: Find Public Sensitive Information

CyberSudo
19 Mar 202410:33

Summary

TLDRThis video teaches essential skills for ENT (Ethical Network Testing) investigators, focusing on efficiently using search engines like Google. The presenter, Sad from Cyber Sudu, demonstrates advanced search techniques, including using Google operators like quotation marks, 'inurl,' and 'site,' to narrow down search results. Viewers also learn about Google Dorks, a tool used to find exposed data such as publicly accessible cameras. Additionally, Sad promotes his ENT masterclass, covering how to find personal contact information and exploit leaked databases. The video encourages viewers to subscribe for more ENT and ethical hacking content.

Takeaways

  • 🔍 Mastering search engines is crucial for effective ENT investigation.
  • 📧 The course offers skills to find personal emails, phone numbers, and use leaked databases.
  • 💻 Subscribers get a 25% discount, access to cyber toolkits, and ethical hacking courses.
  • 🔑 Using Google Dorks is essential to narrow down millions of search results efficiently.
  • 🔗 Quotation marks in Google searches help find exact matches for names and keywords.
  • 🌐 Google operators like 'inurl' and 'site' can pinpoint specific pages or URLs quickly.
  • 🖼️ Searching via images can help identify users who comment or interact with certain posts.
  • 🔄 Cached pages in Google can show deleted posts or comments not visible on original platforms.
  • 📝 Combining names with cities or countries helps refine search results, especially for common names.
  • 📷 Google Dorks can also be used to find publicly accessible cameras and other sensitive information.

Q & A

  • What is the main focus of the video?

    -The main focus of the video is to demonstrate how to efficiently use search engines, particularly Google, for ENT (ethical network tracking) investigations.

  • What are some of the topics covered in the ENT master class mentioned in the video?

    -The ENT master class covers how to find someone's personal email address, phone number, and use leaked databases for investigations. It also includes courses on hacking wireless access points and using radio frequency attacks to unlock vulnerable cars.

  • What is a Google dork, as mentioned in the video?

    -A Google dork refers to the use of specific search operators and parameters in Google to narrow down search results, often used to find specific information such as personal data, cached results, and publicly accessible content.

  • How does the quotation mark operator help narrow down search results?

    -The quotation mark operator helps by forcing Google to search for the exact phrase or name within the quotation marks, reducing the number of irrelevant search results.

  • What does the 'inurl' Google operator do?

    -The 'inurl' operator instructs Google to look for a specific word or phrase within the URL of search results, which can be useful for tracking usernames or other unique identifiers across websites.

  • Why is it useful to search for someone on Facebook through Google instead of using Facebook's search engine directly?

    -Using Google to search Facebook can reveal cached results, including posts or comments that the person might have deleted. Facebook’s own search engine wouldn’t show these deleted or hidden items.

  • How can the 'site' operator be used effectively in searches?

    -The 'site' operator limits search results to a specific domain. For example, searching for someone's name on specific websites like Facebook or Twitter without going to those platforms directly.

  • What is the benefit of using 'and' in Google search queries?

    -The 'and' operator allows users to combine two or more search terms, helping narrow the results to those that include both keywords, such as a person's name and a specific location or profession.

  • What is the Google Hacking Database (GHDB) mentioned in the video?

    -The Google Hacking Database (GHDB) is a collection of Google dorks that can be used to find specific types of information such as publicly accessible cameras, databases, and other sensitive content indexed by Google.

  • What is an example of using a Google dork to find a publicly accessible camera?

    -An example provided in the video is searching for 'view.shtml' in the URL along with the keyword 'camera,' which reveals live camera feeds that can be accessed without a password.

Outlines

00:00

🔍 Mastering Search Techniques for ENT Investigations

The speaker introduces an essential skill for ENT (Ethical and Network Testing) investigators: efficiently using search engines. The video will cover techniques to find personal email addresses and phone numbers using leak databases and Google Dorks. Viewers are encouraged to subscribe to the newsletter for a discount and additional courses on ethical hacking, such as hacking wireless access points and unlocking vulnerable cars. The speaker also emphasizes the importance of using Google operators to narrow down search results, demonstrating with examples how using quotation marks and specific keywords can significantly reduce the number of irrelevant results.

05:02

🔗 Using Google Dorks for Specific Information

This section focuses on how to use advanced Google search operators to find specific information about a person, such as username mentions in URLs. The speaker explains how to use the 'inurl' operator to locate occurrences of a username in web addresses, reducing search results to a manageable number. He highlights the efficiency of this method by demonstrating how a simple search for his username returns only a few relevant results, saving time and effort. The 'site' operator is also introduced to search within specific websites, such as Facebook, and to find cached versions of deleted posts.

10:03

🔎 Combining Search Operators for Precision

The speaker expands on the use of Google operators, combining multiple terms and operators to refine search results further. By adding specific keywords like a city or a profession along with a name, search results can be narrowed down even more effectively. He showcases how this technique can be particularly useful for common names by adding a city, reducing irrelevant results and pinpointing the exact information needed. The speaker also introduces the Google Hacking Database, which contains numerous Google Dorks that can be used to find sensitive information like cameras and databases.

Mindmap

Keywords

💡Google Dorks

Google Dorks are advanced search techniques using specific operators to retrieve more refined or targeted search results from Google. In the video, the speaker demonstrates how using Google Dorks, like placing search terms in quotation marks or searching within specific URLs, helps to narrow down search results, making investigations more efficient.

💡Quotation Marks

Quotation marks are used as a Google operator to search for an exact phrase or word combination. In the video, the speaker uses quotation marks to narrow down a name search, reducing the search results significantly from thousands to a few hundred, showcasing the importance of precise searches in investigations.

💡Site Operator

The 'site' operator is a Google search modifier that limits search results to a specific website. In the video, the speaker explains how it can be used to search within a specific site like Facebook or Twitter, demonstrating how it helps to find information more efficiently, even for deleted posts.

💡ENT Investigation

ENT investigation refers to 'Ethical Network Testing' investigation, which involves using legal and ethical methods to gather information online. The speaker introduces this term to describe the overall theme of the video, focusing on how search engines and other tools can be used to find personal data ethically for investigative purposes.

💡Cached Results

Cached results refer to a stored version of a webpage that Google saves. In the video, the speaker highlights how cached pages can display content that has been deleted from the live version of the site, which is valuable in ENT investigations when seeking deleted or hidden information.

💡Inurl Operator

The 'inurl' operator is a Google Dork that helps find search terms within a URL. The speaker demonstrates its usefulness by showing how searching for a username with the 'inurl' operator can significantly reduce search results, aiding in pinpointing specific online profiles or posts.

💡Google Hacking Database

The Google Hacking Database (GHDB) is a collection of Google Dorks that can be used to find vulnerable information online, such as publicly accessible cameras or databases. The speaker introduces this concept to show how these pre-set search strings can be leveraged for ENT investigations.

💡View.shtm

View.shtm is a file type often found in URLs related to publicly accessible cameras. The speaker uses this example in the video to demonstrate how a specific Google Dork can locate unsecured cameras online, which is part of ethical hacking investigations into vulnerabilities.

💡Username Search

Username search involves using search engines to track down where a specific username appears across different platforms. The speaker demonstrates this in the video by searching for his own username to illustrate how investigators can trace someone's online presence efficiently using Google operators.

💡Radio Frequency Attack

A radio frequency (RF) attack is a type of cyber attack that exploits vulnerabilities in wireless systems, such as car locks. The speaker briefly mentions this concept in relation to a course offering, tying it to the broader theme of ethical hacking and investigation techniques.

Highlights

Introduction to using search engines efficiently for ENT investigations.

Course offering: Learn to find personal email addresses, phone numbers, and use leaked databases for ENT investigations.

Promotion: 25% discount on the course, plus access to a cybersecurity toolkit and ethical hacking courses.

Using Google Dorks to narrow down search results based on specific information.

Example of using quotation marks to search for an exact match of a name in Google.

How to search for a username within URLs to identify related accounts across different platforms.

Using the 'site:' operator to limit searches to a specific website, like Facebook or Twitter.

The advantage of using Google over a platform's internal search for cached results, which may show deleted content.

Exploring Google Image Search to identify related content like comments or hidden posts linked to a specific name.

How to combine multiple operators (e.g., site:, inurl:) to further filter search results and locate relevant information.

Using the 'AND' operator to link a person's name with other keywords like ENT or a location for more targeted searches.

The importance of refining searches for common names to avoid wasting time on irrelevant results.

Introduction to the Google Hacking Database and how to find publicly accessible cameras, databases, and sensitive information using Google Dorks.

Demonstration of finding and accessing an unsecured live camera feed using a simple Google Dork.

Challenge to viewers: Geolocate the live camera footage from the demo and share findings in the comments.

Transcripts

play00:00

in this video I would like to show you

play00:01

one of the most essential skills that

play00:03

you have to get as an ENT investigator

play00:06

which is using search engines

play00:08

efficiently now I have an ENT master

play00:11

class on how can you find someone's

play00:13

personal email address and personal

play00:14

phone number and also using leak

play00:17

databases to escalate and leverage your

play00:20

ENT investigation if you're are

play00:22

interested in taking this course you can

play00:24

subscribe to the newsletter you'll get

play00:26

25% discount plus the cyber aome toolk

play00:30

plus to many ethical hacking courses on

play00:32

how you can hack your own wireless

play00:34

access point and how can you unlock

play00:36

vulnerable cars using radio frequency

play00:39

attack so let's get started hello and

play00:42

welcome to this video my name is sad

play00:44

from cyber sudu don't forget to like And

play00:46

subscribe not many of you watch the

play00:49

video and subscribe so make sure to

play00:50

subscribe to the channel and follow me

play00:52

on social media for more aent and

play00:55

hacking content now I'll be posting aent

play00:57

tips on my Instagram and on my LinkedIn

play01:00

account so make sure to follow me there

play01:02

so what we are going to do in this video

play01:03

is how can you use Google dorks to

play01:06

narrow down our search results so if you

play01:09

have the person name and you just type

play01:11

it in Google you get maybe millions of

play01:14

sear results but if you have some other

play01:17

information that could be related to

play01:19

this person then you can narrow down the

play01:21

search result by using the Google

play01:23

operators to filter your search results

play01:26

so without being said let me show you

play01:28

examples on how you you can do this now

play01:31

since Google is one of the most popular

play01:33

search engines we will be relying on

play01:34

Google for the purpose of this video and

play01:37

to make this video not very long so if I

play01:40

just search for my name for example

play01:42

saraj and hit enter we can see that we

play01:44

get like

play01:46

250,000 search results and we can see

play01:49

that these are searches that are related

play01:51

to me as you can see I have posted

play01:54

something on Z security I have a

play01:55

LinkedIn account this is not my Facebook

play01:58

account Etc but but this is not a very

play02:01

efficient way because you don't want to

play02:02

look at 20 250,000 search results so one

play02:05

of the most important Google operators

play02:08

that you can use to nor done your search

play02:10

result is putting the text between two

play02:12

quotation marks so in this case if I put

play02:15

s Sage within two quotation marks Google

play02:18

will only look for this name it's not

play02:21

going to look for anything else I hit

play02:22

enter we can see that right now we have

play02:26

7,90 search result which is way less

play02:29

than before four which is why it's very

play02:31

important to use the quotation mark Now

play02:34

by looking at the first search result we

play02:36

can see that we have a LinkedIn account

play02:38

which is my LinkedIn account and we can

play02:40

see that the username is s SJ so what we

play02:44

can do is that we can tell Google to

play02:46

look for this username in the URL and by

play02:49

doing this we will see where this

play02:52

username is actually used so if we say

play02:55

for example in url and then s saraj what

play03:00

this is going to do is that it's going

play03:02

to look for this username in the URLs

play03:06

and we can see that we only have five

play03:07

search results the only account that I

play03:10

have is this one this LinkedIn account

play03:12

the others are not mine but we can see

play03:15

how much effort we have saved this is

play03:18

why it's very important to use Google

play03:20

operators because it will narrow down

play03:22

your search result and it will save a

play03:24

lot of time so another very important

play03:26

operator that you can use is called site

play03:29

which will serve SE in a specific site

play03:31

so let's say that you are looking for s

play03:33

in Facebook instead of going to Facebook

play03:36

and search for S which is something that

play03:38

you can do you can actually use Google

play03:41

search engines to do so but you may ask

play03:44

and say hey why would I even go and use

play03:47

Google if I have Facebook I can just go

play03:49

to Facebook and then search for this

play03:51

person and the answer is when you search

play03:54

for this person in Google sometimes you

play03:56

will find some cashed results and if the

play04:00

person has deleted a

play04:03

post or a comment then they will appear

play04:09

on the Google search engine so in this

play04:11

case I have specified the website that I

play04:13

want to look in and I want to search for

play04:16

the string s saraj or the text S saraj

play04:19

I'm going to hit enter and we can see

play04:21

that we have 165 search results instead

play04:23

of

play04:24

250,000 and we can see that we have the

play04:26

username s SJ and we have other people

play04:29

who are named also s saraj now what I

play04:32

like to do is just to go to images and

play04:34

see what information I can find here

play04:36

because sometimes you will find images

play04:39

of the people who posted something for

play04:41

example or maybe s saraj has commented

play04:44

on pictures so if I clicked on this m

play04:48

MSI laptop and then clicked on here it

play04:51

will open this post and you can see that

play04:53

the post is actually not posted by sad

play04:56

saraj you can see that it's might be

play04:59

something in the comments and if I

play05:01

scroll down a little bit I can see that

play05:05

sad SJ is actually in here or I can say

play05:08

uh contrl F and inside and I will be

play05:11

able to find him and we can see his

play05:13

comments now this is not something that

play05:15

this is something that you cannot see

play05:17

when you go to Facebook because the

play05:20

group could be private Etc and this is

play05:23

why Google is very important and if you

play05:25

went to All For

play05:27

example you can go and and see if they

play05:31

have posted something and see whether

play05:33

this page is actually cached so you can

play05:35

click on this dots and then click on

play05:38

here and this one is not cached so I can

play05:41

scroll down a little bit I can click on

play05:43

here this one is cached I can open the

play05:46

cached version so if they have deleted

play05:49

their comment you can find it actually

play05:51

in here you can see that this is the

play05:53

mobile version if I scroll down we can

play05:55

see that he have mentioned somebody

play05:57

called Omar sharov so this is why it's

play05:59

very important to use Google search

play06:02

engine or the Google operators now if

play06:04

you would like to search in multiple

play06:06

websites what you can do is just say

play06:08

site and then the domain name or site

play06:12

and then the domain name in this case I

play06:13

said look for sat sage in Twitter or in

play06:17

Facebook and when I hit search I can see

play06:19

that I have 140 search results now if we

play06:23

look at sad saraj in Twitter for example

play06:27

going to hit enter and scroll down we

play06:29

can that we only have like four search

play06:31

results we can see that somebody here

play06:36

like mentioned me or did something if I

play06:38

clicked on the post or the URL it will

play06:42

redirect me to the profile of the person

play06:46

and I can search in his profile where he

play06:49

mentioned me as you can see he mentioned

play06:51

me right here or I can open the cashed

play06:53

version as we have done before which

play06:56

will make it very e easy for me as you

play06:59

can see here's the tweet that he did to

play07:02

mention me now the second very very

play07:05

important Google operator that you need

play07:07

to use is the and so I'm going to say s

play07:10

SJ and ENT so it will only give me

play07:13

search results of this name and this

play07:16

keyword so since I do ENT videos then

play07:19

it's going to show me where this person

play07:22

has appeared with the keyword ENT and as

play07:25

you can see we have

play07:27

330 results now if I removed this and

play07:30

only looked for sat saraj we have more

play07:33

than 7,000 results now the way you can

play07:36

use this is by adding the person's name

play07:40

and then add the city or the country

play07:43

where he lives or she lives and

play07:46

therefore you will get only information

play07:48

that are related to these two key wordss

play07:52

for example I can say s SJ and and

play07:56

Germany I don't know if I'm going to get

play07:58

anything but I just try it and as you

play08:01

can see we can only see that we have

play08:03

five search results we can see this is

play08:06

my blog and this is something something

play08:09

that's related to me as well I found

play08:11

this method very very effective because

play08:13

if you have a very popular name like

play08:16

John Smith then you need to narrow down

play08:18

the search results because if you didn't

play08:20

do this you're going to waste a lot of

play08:22

time the last thing that I would like to

play08:24

show you is the Google hacking database

play08:27

and this database contain many Google

play08:30

doors that you can use to find certain

play08:32

information for example you can find

play08:34

publicly accessible cameras you can find

play08:37

maybe databases you can find usernames

play08:40

passwords everything using the Google LS

play08:44

now in this example I would like just to

play08:46

show you a demonstration and here are

play08:49

all the new recently added Google dorks

play08:53

you can basically just copy it and test

play08:55

them on your own and in this example I'm

play08:58

just going to look for online accessible

play09:00

cameras and one of the Google dorks that

play09:03

I've tried is actually this

play09:05

one so if you have copied this Google

play09:08

dork and put it in Google we can see

play09:10

that it's actually very simple we're

play09:11

only looking for view. shtml in the URL

play09:16

and the keyword camera so let's do this

play09:19

and here are the search results and if

play09:21

we open this one for example we can see

play09:24

that this is an axis uh camera I believe

play09:28

and we can wait a little bit and see

play09:30

that this is actually a live camera that

play09:33

we were able to see just by using this

play09:36

Google D and you don't have to enter any

play09:39

password or username to view this camera

play09:43

and as you can see we are able to view

play09:46

the footage of this camera without

play09:48

ending any username and password and

play09:51

here's a challenge for you if you were

play09:53

able to

play09:54

geolocate this image or this video then

play09:58

please tell me in the comments

play10:00

section and how you have done it I'm

play10:03

very interested in this so that's it for

play10:05

this video if you liked it and learn

play10:08

something new don't forget to like And

play10:11

subscribe to the channel I'll appreciate

play10:13

this a lot and Google will

play10:16

just uh recommend my videos to other

play10:18

people who are interested in oen thank

play10:21

you so much for watching and I'll see

play10:23

you

play10:28

soon

play10:30

[Music]

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
ENT InvestigationGoogle SearchGoogle DorksCybersecurityHacking ToolsEmail SearchPhone LookupLeak DatabasesEthical HackingAdvanced Search
¿Necesitas un resumen en inglés?