Loopus

Pro Content

This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.

Network Penetration TestingReconnaissance & OSINT

OSINT Techniques

30 min
lab
+60 XP

Learning Objectives

  • Use search engines for security reconnaissance
  • Master Google dorks for finding vulnerable targets
  • Understand how to discover exposed files and directories

Google Dorking and Search Engine Reconnaissance

Search engines are remarkably powerful reconnaissance tools because they've already done the hard work of crawling and indexing the internet. By constructing clever queries, you can use Google, Bing, and other search engines to discover sensitive information that organizations never intended to be public.

Understanding Search Engine Operators

Google and other search engines support special operators that filter and refine your searches. These operators transform a search engine from a general information retrieval tool into a precision reconnaissance instrument.

The site: operator restricts results to a specific domain. Searching for site:target.com returns only pages indexed from that domain and its subdomains. This immediately gives you a map of what content the search engine has discovered on your target.

The filetype: operator finds pages with specific file extensions. Searching for site:target.com filetype:pdf returns all PDF documents indexed from the target domain. Expand this to other interesting file types like DOC, XLS, SQL, LOG, or BAK to discover potentially sensitive documents.

Combining operators creates powerful queries. site:target.com filetype:sql intext:password might find SQL backup files containing password data. site:target.com inurl:admin reveals administrative interfaces. Each combination narrows your search to increasingly specific and potentially vulnerable content.

Finding Exposed Information

Organizations frequently expose sensitive information without realizing it. Configuration files, backup archives, debug pages, and internal documentation regularly appear in search results because developers forgot to restrict indexing or accidentally deployed them to public servers.

Search for common sensitive file names: site:target.com "Index of /" finds open directory listings. site:target.com ext:log discovers log files. site:target.com "powered by" OR "running on" sometimes reveals version information that hackers can use to find known vulnerabilities.

Environmental files deserve special attention. Queries like site:target.com "DB_PASSWORD" or site:target.com "api_key" sometimes return configuration files containing credentials. Even when credentials have been changed, finding such files reveals poor security practices worth exploring further.

The Google Hacking Database

The Google Hacking Database, maintained by Offensive Security at exploit-db.com, contains thousands of proven search queries that find vulnerable or exposed systems. These "dorks" represent collective knowledge accumulated by the security community over years of research.

Studying the Google Hacking Database teaches you how to think about search-based reconnaissance. You'll learn patterns that you can modify and apply to your specific targets. A dork designed to find exposed phpMyAdmin installations can be adapted to find exposed instances of any web application.

Searching Responsibly

Remember that search engine reconnaissance reveals information about real systems owned by real organizations. While using search engines is legal, what you do with the information you find may not be. During authorized penetration tests, document your findings carefully. Outside of authorized testing, admiring vulnerabilities from afar is legal while exploiting them is not.

Also consider rate limiting your searches. Running hundreds of automated queries in quick succession can trigger Google's abuse detection, temporarily blocking your access. Space out your queries and use search APIs where available for bulk research.

Answer the Questions0 / 4 completed

📚 KnowledgeQuestion 1

What finds hidden services?

Format: ********* ****(14 chars)
Exact match required
⌨️ Hands-OnQuestion 2

What search engine finds exposed IoT?

Format: ******(6 chars)
Exact match required
📚 KnowledgeQuestion 3

What exposes previous passwords?

Format: ****** ***********(18 chars)
Exact match required
⌨️ Hands-OnQuestion 4

What extracts document info?

Format: ********(8 chars)
Exact match required
Answer all questions correctly to unlock the next lesson

Interactive Sandbox

Loading sandbox...

Submit Flag

Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}

Previous
Answer all questions to continue