Google Dorks List For Credit Cards, SQL Dorks, Camera in 2021

As humans, we have always thrived to finding smarter ways of using the tools available to us. The Google search engine is one such example where it provides results to billions of queries daily. This page covers all the Google Dorks available for SQL Injection, Credit Card Details and cameras/webcams in a List that you can save as a PDF and download later.

As interesting as this would sound, it is widely known as “Google Hacking“. It combines different search queries to look for a very specific piece of data that may be interesting to you. The information shared below is only for White hat purposes only.

About Google Dorks and what they are used for

This is a search query that is used to look for certain information on the Google search engine. These are developed and published by security thefts and are used quite often in google hacking.

These are very powerful. They allow searching for a variety of information on the web plus can also be used to find the information we did not even know existed.

Since they are powerful they are used by security criminals often to find information regarding victims or information that can be used to exploit vulnerabilities in sites and web apps.

Google search engine is designed primarily to crawl anything over the web and all this helps to find:

  • Text, images, news, videos and a plethora of information.
  • As it has tremendous ability to crawl it indexes data along the way which includes sensitive information like login credentials, email addresses, sensitive files, site vulnerabilities and even financial information. In most cases we being users won’t be aware of it.

How to use Google Dorks Cheat Sheet (Explained)

How to use Google Dorks (Cheat Sheet)

For this, you simply need to type the below queries in the search box on Google and hit enter. Following are the some of best queries that can be used to look for specific for information:

Google Dork Popular Queries Example:

  1. Inurl:.give “register forum” – This one is used to search for sites on .gov domains which carry the words “register forum”. It searches for governmental sites which allow registering for a forum.
  2. Inurl:.edu “register forum” – This one is used to search for sites on .edu domains that carry words “register forum”. It searches for school sites that allow registering for a forum.
  3. Inurl:.com “powered by vbulletin” – This one is used to search for sites on .com domain which carry the words “powered by VBulletin”. It searched for sites that run on this forum software.
  4. “powered by vbulletin” inurl:.mil – This one is used to search for sites on .mil domain which carry the words “powered by vbulletin”. It searched for military sites which run on this forum software.
  5. “powered by vbulletin” inurl:.edu – This one is used to search for sites on .edu domain which carry worlds “powered by vbulletin”. It searches for school sites which run on this forum software.
  6. “powered by vbulletin” site:.mil – This one is used to search for sites on .mil domains which carry words “powered by vbulletin”. It searched for military sites which run on this forum software.
  7. “powered by vbulletin” site:.gov – This one is used to search for sites on .gov domains which carry words “powered by vbulletin”. It searches for government sites which run on this forum software.
  8. “powered by vbulletin” site:.edu – This one is used to search for sites on .edu domain which carry words “powered by vbulletin”. It searches for sites that run on this forum software.
  9. Inurl:edu “login” – This one is used to search for sites on .edu domains that carry the words “login”. It searches for school sites that contain login information.
  10. Site:.edu “phone number” – This one is used to search for sites on .edu domains that carry the words “phone number”. Student “phone number” – it searches for sites on .edu domains that carry words “student” and “phone number”.
Recommended:  17 Helpful Rsync SSH Command Examples For Linux (2021 List)

RECOMMENDED: Search Engines that are useful for Hackers.

Google Dorks For SQL Injection purposes (SQL Dorks)

SQL Dorks

Scraper API provides a proxy service that is designed for web scraping, with this you can complete large scraping jobs quickly without having to worry about being blocked by any servers plus it has more than 20 million residential IPs across 14 countries along with software that handles JavaScript able to render and solve CAPTCHAs.

  1. Cache

(cache:www.google.com web) shall show cached content with word “web” highlighted. This function can also be accessed by clicking on “cached” link on its main result’s page. The query (cache:) shall show the version of the web page which it has on its cache. Like (cache:www.google.com) shall show Google’s cache for its homepage.

  1. Link

(link:www.google.com) shall list webpages that carry links to its homepage.

  1. Related

(related:www.google.com) shall list webpages that are similar to its homepage.

  1. Info

(infor:www.google.com) shall show information regarding its homepage.

  1. Define

Query (define) shall provide the definition of words you enter after it, which are collected from different online sources. The definition shall be for the complete phrase entered (it shall have all words in exact order typed) like (define:google)

  1. Stocks

If you begin the query with (stocks:) operator, Google shall treat the rest of query terms as stock ticker symbols, and shall link to a page that shows information for symbols. Like (stocks: intc yhoo) shall show information regarding Intel and Yahoo

Note: You need to type in ticker symbols, not the name of the company.

  1. Site

If you include (site) in the query then it shall restrict results to sites that are given in the domain. Like (help site:www.google.com) shall find pages regarding help within www.google.com. (help site:com) shall find pages regarding help within .com urls.

Note: There should be no space between “site” and domain. 

Download SQL Dorks PDF:

SQL Injection Dorks [PDF Document]

ALSO READ: Try these Hilarious WiFi Names and Freak out your neighbours. 

Google Dorks for Credit Card Details (New)

Google Dorks for Credit Card Details

Credit Card details are one of the most valuable pieces of data that an entity with malicious intent can get its hands on. Below are some dorks that will allow you to search for some Credit or Debit card details online using Google.

allintitle

If you begin a query with (allintitle) then it shall restrict results to those with all of the query words in title. Like (allintitle: google search) shall return documents that only have both “google” and “search” in title.

intitle

If you include (intitle) in the query then it shall restrict results to docs that carry that word in title. Like (infinite:google search) shall return docs that mention the word “google” in their title and also mention the word “search” anywhere in the doc (title or no). Putting (intitle:) in front of each word in the query is equal to putting (allintitle:) in front of the query: (intitle:google intile:search) is the name as (allintitle: google search).

allinurl

If a query begins with (allinurl:) then it shall restrict results to those with all query words in url. Like (allinurl: google search) shall return only docs which carry both “google” and “search” in url. It ignores punctuation to be particular, thus, (allinurl: foo/bar) shall restrict results to page with words “foo” and “bar” in url, but shall not need to be separated by a slash within url, that they could be adjacent or that they be in that certain word order. For now there is no way to enforce such constraints.

Recommended:  10 Best Free Note Taking Apps For Windows 10 With Stylus Support

inurl

In the query if you add (inurl:) shall then it shall restrict results to docs carrying that word in the url. Like (inurl:google search) shall return docs which mention word “google” in their url and also mention “search” anywhere in the doc (url or no). If you put “inurl:” in front of each word of query is equal to putting “allinurl:” in front of query: (inurl:google inurl:search) is the same as (allinurl: google search).

Now the search service never intends to get unauthorized access of data but nothing can be done if we keep data in the open and not follow proper security mechanisms.

Emails, passcodes, usernames, financial data and others should not be available in public unless it is meant to be. Like our bank details are never expected to be available in the Google search bar whereas our social media details are available in public as we allow them.

Google Dorks for Credit Card Details [PDF Document]

ALSO READ: Vulnerable SQL Injection Sites for Testing Purposes.

Google Dorks for Online Cameras

Google Dorks for Cameras and Webcams

Security cameras need to be connected to the internet to have a knowhow on what is going on in the area you live, the moment you connect any device with the internet someone can get access to it hypothetically. You can use Google Dorks to search for cameras online that have their IP address exposed on the web and are open to the public.

This scary part is once it is compromised, a security theft can make some lateral moves into other devices which are connected.

After this he/she can:

  1. Disable alarm systems.
  2. Hack into the system.
  3. Torment one house by blasting music.
  4. Turn on the Television and whatnot.

All this and a lot can happen as long as it is connected to the same network. Below are some Google Dorks that can help you discover some Webcams or Cameras that are exposed online.

Download Camera/Webcam Dorks:

Camera and WebCam Dork Queries [PDF Document]

Secure your Webcam so it does NOT appear in Dorks searches:

Passcodes MUST be complex

Do not use the default username and password which comes with the device. Change it to something unique which is difficult to break. Avoid using names, addresses, and others. We suggest using a combination of upper and lower case letters, numbers and symbols.

Change passwords frequently

Never hold onto one password for a long time, make sure to change it.

Keep their firmware up-to-date

Make sure to keep your software up-to-date as this shall help to patch vulnerabilities in software that allow security hackers to access the device. Vendors of surveillance expect users to update their devices manually. So, check to see if you have an update available. Set up manual security updates, if it is an option.

Install a Firewall

This is a network security system that keeps all the bad guys out.

Full Disclaimer: Please use these only for educational and informational purposes only. We do not encourage any hacking-related activities. DekiSoft will not be responsible for any damage you cause using the above information.

Conclusion – Are you using any Google Dorks?

This was our extensive article on Google Dorks Cheat Sheet that you can use mainly for SQL Dorks and finding Credit Card Details. There are also some Dorks share for cameras and webcams that can be accessed by an IP address. You can also save these as a PDF to download. Let us know which ones are you using and why below in the comments.

Qayyum is a full-time developer at DekiSoft that is eager to discover new and exciting advancements in technology, AI, software, Linux and machine learning. He loves playing games in his spare time.

Leave A Reply

Please enter your comment!
Please enter your name here