Dorking For Kings
Dorking For Kings
Kings of Dorking
Cracking has been a huge field over the previous years, fluctuating in size as legal concerns
becoming greater as more information is divulged by the elites. Building an infamous name
for manual injections and completing complex attacks. Unfortunately, the world of cracking
is not that intimate. Now days all you need is a basic supplier of Dorks, some proxies and
some premade cracked tools from 2014, if you think I’m kidding, half of you buying are
probably using something like that.
The reason I call this unfortunate is now skids and leechers have invaded the lands. And
they’re learning quick, moving their way up from the traditional pastebin scrapers to steal
other people’s dumps and now even actually learning what’s required. Databases are
becoming harder to obtain. Especially private and High Quality ones. I’m here to improve
the quality of your Dorks, teaching you from scratch the logic of Dorking and it’s uses in the
field of cracking. Failed security attempt 1. This was white
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Contents
Chapter 1. Dorking… ............................................................................................................................... 5
What is a Dork? ................................................................................................................................... 5
Why do we use Dorks?........................................................................................................................ 5
FORMS................................................................................................................................................. 6
Keywords............................................................................................................................................. 7
Page Extensions .................................................................................................................................. 7
Files Page Types and Page Extensions ............................................................................................ 8
Chapter 2. Syntax (Google) ..................................................................................................................... 9
Quotation Syntax ................................................................................................................................ 9
Ordering & Capitalization ................................................................................................................... 9
Ordering ........................................................................................................................................ 10
Extended Search Operators Syntax .................................................................................................. 11
Search Operator List: .................................................................................................................... 11
Search Functions: .......................................................................................................................... 13
Chapter 3. Let’s get Started .................................................................................................................. 14
Basic Dorks ........................................................................................................................................ 14
Complex Dorks .................................................................................................................................. 15
The Big Questions ............................................................................................................................. 17
How to make Dork Types .................................................................................................................. 17
Keywords and Parameters ................................................................................................................ 18
More Advanced Keywords ................................................................................................................ 18
Parameters ........................................................................................................................................ 19
Parameters Detailed ......................................................................................................................... 19
Testing Parameters ....................................................................................................................... 19
Parameter Methods .......................................................................................................................... 20
Advanced Dorking ............................................................................................................................. 20
Chapter 4, Syntax. ................................................................................................................................. 22
Google Regex System ........................................................................................................................ 22
Regex Wildcards .................................................................................................................................... 23
Regex Groups ........................................................................................................................................ 24
Regex Escape......................................................................................................................................... 24
GRS .................................................................................................................................................... 25
Advanced Explanation and Usage for GRS ........................................................................................ 26
Wildcards ...................................................................................................................................... 26
Regex Groups ........................................................................................................................................ 28
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Chapter 1. Dorking…
Dorking is the art of understanding and utilizing a search engine to emit the desired results.
If I wanted to find a file on anonfile; I can go on Google and use this search query,
inurl:anonfile.com + Target File
I can find a Tweet with the exact same syntax, and I can repeat this for almost any target
that is at public discretion and isn’t banned from Google.
What is a Dork?
A Dork is a search query that a search engine can read and interpret to provide the most
precise URLs that correlate to that query.
Cracking is, at its simplest form, finding basic, unprotected sites, compromising its security
measures or lack of; exporting information of which is desired and then use them for other
purposes.
This is important because this next part will be complementary to our injection criteria.
There are 3 PRIMARY forms of SQL Injection (SQLi)
Put
Post
Get
Get being the simplest to search for in a Search Engine such as Google or Bing. Our usually
primary Search Engines.
Get is when data is put from a “form” into the URL as a form of temporary data storage.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
FORMS
http://desarrolloweb.dlsi.ua.es/cursos/2012/web-programming-with-php/example-of-getting-data-
from-a-web-form
The concept to be taken is that data is input from some variable on a site, being user
completed or automatic in the functionality of the site. Data will be sent to the server (what
the website is being hosted from) and complete a task, storage or site functionality to your
session or others.
The reason this information is important is SQLi is the implementation of malicious code to
manipulate the backend storage server to send a request to the Database and “Exploit” data
from said database or complete other malicious attacks (Database = $$$). This manipulation
can stereotypically only occur with an abstract Parameter (A Parameter is the session
information of data input that can be used to locally store where the user is on the site).
With this essential FORM of information, this will allow us to understand the basis of how
our Dorks will achieve a desired goal.
The reason we use Get injection and do not primarily target the other Parameter functions
is because, you can’t search for the other ones. It’s just not time efficient to be manually
going through sites, 1 by 1 to eventually find a vulnerability. To all SQLi studiers to
understand the joke in that, respects to you. I hope it’s consolidation for the amount of your
time I just wasted.
The reason that introduction to parameters was required, is now you understand WTF a
Page Parameter is, and now understanding the process of Dorking onward will be like
learning how to fix a speech impediment.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Keywords
Page Extensions
Page Extensions can occur in URL’s after the naming of a File Page (as seen below).
We have our misconceived page types, which are actually just inbuilt with the domain,
which come with the Domain on purchase by the site holder, or else the site would go
nowhere.
Examples:
Amazon.com
Netflix.com
Idk.org
Wikipedia.org
And so on so forth. (gov, com, org, shop, online, xyz, waytomuchshittobehere)
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
These are what we call our Page Extensions, completely ignoring the domain types because
it’s completely irrelevant to our Dorks.
When Dorking, I’ve experienced almost all sites with page parameters in the URL also have
page type. Becoming a useful asset to restrict unlikely injectable page param extensions to
more likely to succeed ones.
We primarily use:
php
asp
This is because these are most commonly used languages to connect to the database
through a page, like shown in that form article above.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
The most important thing to keep universal in the creation of ALL DORKS, is the concept of
syntax. If I spoke English with a Chinese sentence structure, it wouldn’t make any sense. It’s
the exact same to Google or Bing. If you don’t speak their language, they won’t understand
you. ALWAYS CHECK WHAT SYNTAX YOUR DESIRED SEARCH ENGINE OPERATES ON
Syntax is the way that something is interpreted. Google reads phrases and independent
terms depending on its “smart read” features. Which we can’t disable.
If we were to search
Gaming shop.com
Google will search for a site with shop.com in the domain and Gaming being somewhat of
importance to that site. This is an issue because, very few sites will contain [shop.com]
Hopefully, this highlighting has distinguished how google will now interpret this search.
Quotation Syntax
Most search engines allow the user to input “” (Quotation marks) to help indicate this
word/phrase must be written on the site. This is considered a Search Operator but is not
usually disclosed on services like Google and Bing as it serves as common knowledge to the
informed. Use it to your advantage. It can be used to String words together to create
phrases.
Remember search engines have their own criteria on syntax, which leads without saying
that it’s most ideal to test out all possible syntax uses to help assist with the usage of these
search operators when creating our Dorks.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Ordering
Order matters. Easiest and most conceptualised explanation of this change is that. When utilizing
the targeting of page extensions, parameters or directories, consider the order of the URL that can
be the results of this target.
What does this mean? Well a site doesn’t put .com after the parameter, simply because it’s the
domain and that’s not possible unless it’s a redirection of the site. Which *hint* is exactly what
happens if you do this. Same can be said for page extensions and directories.
Domain Extension GOES BEFORE ALL Page Extension, Directories and Parameters!
e.g.
+ intext:
e.g.
intext:shop + online
e.g.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
When Dorking, we will sometimes face issues with syntax. An easy way to avoid phrases
linking we don’t want them to and linking phrases we want to, we do this by using Search
Operators and Search Functions.
Below is a list of Search Functions and Operators for Google. This will become vital in
creating your OWN unique Dork types and Dorking techniques. Making the quality of your
Databases you find increase drastically. Please enjoy this Archive of relevant information.
OR
Usage: 12.3
Result:
12.31
11.3
OR
Usage: .php?
Result:
.php?whateverisnext
+ Connect Queries Usage: Gaming + Shop
& AND Gaming & Shop
~ Synonym E.g: ~happy
Results:
Confused?
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
“hello” “world”
“hello world”
[a,b,c,d,e,f,g,h,etc]
[1,2,3,4,5]
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Search Functions:
Search Function Function Example
cache: Cached version of site on cache:site.com
google
inanchor: Find pages on sites with that Usage: inanchor:how to
name basic
Result:
site | How Basic
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Basic Dorks
XW KW .PE?PP=
Amazon shopping .php?cartID=
OR
KW KW2 .PE?PP=
KW2 being the second keyword
Makeup Shopping .php?cartID=
This can help in finding non site-specific combos and instead attempting to find generalised
combos for this field of topic.
This concludes the Basic Dorks section, the introduction to a world of Dorking.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Complex Dorks
Complex Dorks are the next level of Dorking. We can use Search Functions to improve the
accuracy of our search. I will only be providing the Search Functions (SF) from Bing and
Google.
Complex Dorking is something very useful when creating Dorks. It’s the usage of Search
Functions to optimize the results of a search to meet a specific criterion.
Complex Dorks
Keyword (KW)
Page Type (PT)
Page Parameter (PP)
And new to the list
Usage of Search Functions can be debated. But I don’t care how you want to debate it.
inurl:?PP= or .PT or Directory
intext:KW
ext:PT
filetype:PT
site:.DE
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
We are able to add our domain extensions that came with the domain into the Dork,
enabling us to choose a country code (us, it, kr, au, br, nl) OR our regular sites domain type
(com, org, net). This is what we consider to be our targeted country Search Function. Which
can help. Other aspects that help is changing the location of the Parser to where you’d like
to extract URLs for as Google likes to optimize it’s results with the location of the user.
Helpful Right?
The amazing thing about google is it has such a large amount of capabilities; it is genuinely
hard to keep up. Thankfully I’ve comprised the most detailed guide to using Google
optimally right here.
(KW) .(PT)?(PP)=
Transforming this Basic Dork into a Complex Dork is as using a Search Function
For Example:
intext:“mario bros” .php?id=
Now is a basic example of how we can use Search Functions.
Donjuji. A cracker to initiate the UHQ mainstream of Combo Cloud’s. Released a very
Basic Guide to Dorks several years ago. “https://pastebin.com/raw/39wTesCS”
In this guide he outlines the usage of Search Functions and demonstrates the usage of Search
Functions to target his page types and parameters. Very interestingly he also exposed a common
accessibility vulnerability of lot of databases have. That being the “.sql” file exposed on the search
engine as an anchor page. A rather large mistake by the developers. This out of the box usage of
Search Functions as well as knowledge of file types and exposure vulnerabilities is exactly what
hacking stands for.
The definition for hacking it trying to get around something, find a fix. Or in our case, find a fix to our
Dorks, finding these vulnerabilities like how Donjuji experimented. I HIGHLY SUGGEST trying to find
your own methods as there are plenty undiscovered. One day you may become the next Donjuji.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Hopefully this helps with your understanding of Search Functions. It’s a pretty basic tool
which, once utilized becomes an amazing tool in the field of Dorking.
I will be using my own formatting for declaring each part of a Dork. This is because I’m not happy
with how the community labels them, so I’m making my own. This will hopefully become a branding
of sorts towards my Dorks but I’ll accommodate however you want to interact with these words and
what you want to use as an abbreviation.
Keywords 2 = KW2
Page Extension = PE
Parameter = xP
Search Function = SF
Directories = Dir
Keyword 3 = KW3
Making Dork Types requires you to FOLLOW the rules of Dorking. For Google this is inclusive of the
rules in Google Syntax of Chapter 2.
With this logic we can use our Operators, Search Functions and knowledge of Dorking to create Dork
Types.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
These basics of Dorking will not change. So worth with the logic I’ve provided to trial Dork Types and
create a list of successful Dork Types to use when generating. This will allow you the advantage of
your own custom Dork Types to yourself instead of sharing with your peers by me sending mine.
Our hunt for ideal Keywords and Parameters has left people on multiple sides of the scales.
But here’s the secret; you cannot target something that doesn’t exist in order to obtain
results, this makes our life too easy. I say this because we can use the same search engine to
find sites operating with SEO (search engine optimization) and use their keywords and other
sites parameters from my initial keyword list results. To complete this simple process, begin
by creating a list of random keywords for your target.
e.g. Netflix
And complete this till you have a solid list of keywords. Then parse it on your search engine
of choice and runs the URL results on a tool like METAKOSTRIV, which will extract the
metadata from the site including keywords, parameters and other valuable information for
later on in this E-Book.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
It’s important to diversify your Initial Keywords to get unique results, try adding actors, brands,
games and other unique identifiers to expand your results and give you tailored keywords and
parameters. I also suggest prioritizing more than just your target product or brand, try finding similar
products as well to expand the range of targeting, some of your Primary Keywords can also be just
related to your category rather than the target itself.
Parameters
Once you complete this task, simply remove language parameters, long keywords and
duplicated. Another skill you will learn with experience is what parameters are worthless
and never show up as a vulnerable parameter. In my experience I’ve derived that language
orientated parameters and extremely long ones that are EXTREMELY specific never obtain
results or sometimes URL’s at all. Then feel free to begin sending your keywords and
parameters into battle and start testing your target.
Parameters Detailed
Parameters have 2 types, Dynamic and Static. Static parameters cannot be changed,
Dynamic can change. You may wonder what this is referencing to. Static means that it
cannot change until the webpage is reset, and a Dynamic can be altered on the go without
resetting the webpage. This is significant because static parameters cannot go to anything
that the server doesn’t give it, so our basic Get parameters will not be vulnerable to such
targeting methods. This means that we need to target dynamic parameters to increase our
vulnerability figures. How does this work?
Avoid language parameters,
Avoid country parameters,
Avoid “li” parameters or other parameters which will only gain data from a set list on the
server. Some may argue that page is a static parameter, well, not always. So, these aren’t
set in stone, but from experience, it’s suggested to avoid regularly static parameters.
Another way to look at this is to consider what will be stored in the Database and what will
be unique for the page. A list of ID’s will be stored in a Database because it’s a list and
should be accessible globally amongst the site, but a list directly for one page would only be
for that individual page. It’s a logical theory and can help clear confusion about Parameters.
Testing Parameters
Testing Parameters is rather simple, you cannot test if they’re dynamic or static usually, but you can
check if the parameter is popular enough that you can add keywords and other variables to the
search query and still obtain results. This is important to save bandwidth, reduce invalid Dorks ratios
and make life easier. The easiest way to test this is to grab 2 simple Keywords correlating with your
target and add ‘inurl:PP=’. If this result gets several hundred thousand URL’s or more then the
Parameter is rather simple to Dork with, if it’s less be cautious about the Dork Types you use. This
method is useful for people without experience in Dorking and it’s also useful if you just haven’t
experimented with Parameters before.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Parameter Methods
Some Parameter Methods can be the usage of targeting Parameters of Plugins and Drivers.
A perfect example of this is the “ODBC” Driver used on SQL Servers.
(https://dev.mysql.com/doc/connector-odbc/en/connector-odbc-configuration-connection-
parameters.html) Plugins and Drivers that operate Directly with the Database will increase
your success rates by reducing the exposure to Parameters not involved with the Database.
Good sources for these are things like the main Database Provider (DBMS) site:
https://www.mysql.com/products/connector/
https://dev.mysql.com/downloads/
ETC
This method is simple and logical, and I incline everyone to utilize it by finding your own
targeted resources.
This is always fun finding new methods. This one is extremely useful and I’m happy I figured
it out. If you find any that satisfy you that you’d feel comfortable sharing with me. I’d
appreciate it.
Another method is altering the Initial Keywords you created and add ‘ext:php’ to them. This
is mainly because a lot of sites with exposed page extensions usually have parameters to
store data, this can give you plenty of parameters to play with and expand your targeting
range. It’s a useful tool and should be utilized.
Advanced Dorking
Advanced Dorking…
Advanced Dorking is including Search Operators into your Dorks. This is pretty straight
forward. The way we do this is simply by using our big brains to link phrases we want to
connect. If we want certain keywords to combine, we will use Search Operators to do that.
If we want to prioritize a certain keyword, we can do that. This is about making your Dorks
as optimized as they can get.
Example:
Dog Bed
Google will receive this as two separate words, separated or one not even being in the
results. The big issue is we usually don’t put in our phrases to be separated by Google.
The way we could complete this is to use one of our Search Operators
& + “” ()
E.g.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Highlighted are the usage examples of these Search Operators. All completing the same /
similar task. By using Search Operators. Getting sites following your request of stringed
queries can become easier by simply adding these to your Dork types. Use them efficiently
and you will expect nothing less than results alongside your Search Functions when
required.
To be clear. I don’t always use Search Functions or Search Operators. I always like to
consider my target demographic and what I’m really going to be expecting.
What do I mean?
Well, if I’m using a target with an extremely small demographic, it makes no sense for me to
restrict my search query with a Search Function or requiring keywords to be directly linked
on the site.
BUT
When targeting something without a target keyword, (Amazon, League of Legends, Roblox)
then it’s a good idea to include multiple strings. This is SOULY because of the sheer number
of URLs you get when you don’t have a designated target for your Dork. With an excessive
number of URLs, you’re less likely to find Databases (DB) that are vulnerable to SQLi.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Chapter 4, Syntax.
Now in the previous chapter on syntax we made it aware that Google speaks its own
language. Being able to understand how google will receive separate queries and how to
optimize that system while Dorking.
Now we are going to bring light to a method of which people perceive as “HQ”. Which is
simply just understanding how google will interpret its regex.
Regex is a very complex topic, for a basic rundown, Regex is shorter terms/characters of
which register to an AI and translate to create a formula, this formula could be to identify
certain characters or skip characters; or how we will use it.
We will be using the Google Regex System (GRS) to optimize our Dorks. As I mentioned
earlier in this book, Google has its smart query reading AI. Well, we can actually do
something similar to turning it off. We can inform it on how to read a Query.
You may be asking, “But it already understands me doesn’t it?”. And the truth is, I have no
clue. I’m not a developer. But what I can be certain of is by using these Regex “Formulas”
you will be increasing the accuracy of your search once again.
Now this may be confusing. And trust me it should be. I’ve reused data from earlier with
some minor adjustments to make it completely accurate. The reason I’ve done this is we
need to start somewhere. And it’s certainly not going to be at the complete top, so you lose
context of how things work. In my experience I’ve been able to utilize the Google Regex in
almost every Dork I currently produce, with few exceptions of certain methods of targeting
sites.
The Google Regex System is comprising of characters with plenty of use that can change,
alter, optimize, randomize and other unique features for Dorks. It’s an important tool to
preserve the quality of Dorks that obtain unique results, and it should be used with an
understanding of purpose. It’s vital to understand the usage of these in order to get the best
results possible out of them.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Regex Wildcards
Operator Function Example
. Matches any single Usage: 1.
character (letter, number or Result:
symbol) 10, 1A
? Matches proceeding character Usage: hi?
0 or 1 times
Result:
h
his
hi
+ Matches the preceding Usage: 10+
character 1 or more times
Results:
10, 100
* Matches the preceding Usage: 1*
character 0 or more times
Results:
1, 10
| Creates an OR match E.g: 1|10
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Regex Groups
Operator Function Example
() Matches the enclosed (10) matches
characters in exact order
anywhere in a string 10, 101, 1011
Regex Escape
Operator Function Example
\ Indicates that the adjacent \. indicates that the adjacent
character should be dot should be interpreted as
interpreted literally rather a separate section of the
than as a continuation of query to anything prior.
strings.
Gaming \ Shop \ inurl:id=
Another example and usage
that’s different to how
other perceive. It’s like the
following characters after
the \ are a new “string” of
data in the query, all that
follows is a new target.
Otherwise, it’s all one
singular target string.
This stuff can even go more complex. But fortunately, that will not be necessary. I copied all
these definitions directly from google. Using these in according ways can help.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
GRS
The way we would use GRS is by already including Search Operators or Search Functions.
E.g.
Shopping + Cart .php?cartID=
Now, we have our Search Operator +
There are many ways we can edit this Dork to include GRS.
Shopping + Cart .php ?cartID=[0-10]
We’re now targeting a method we will explain further in the book called Numeric Dorks. Fix,
just add a random number anywhere in the Dork except the parameter or in search
functions to reduce the chance of invalidating the Dork. Enjoy!
All that you need to know about that method is that, almost every single tutorial you have
ever seen before was wrong. And I can’t explain it shortly here.
E.g. 2
Shopping + Cart \ purchase .php ?cartID=
In this example I have exited the query stringing from the + operator. This usage has made,
Shopping Cart become a target and purchase being a separate string. I’ve also added a space
between .php and the parameter. This is to avoid over intense targeting. I’ve also used a
backslash before the =, a perfect example of taking the next character literally, this is
important because Google has their own Regex for their own parameters for each user,
including their images and search data that is referenced the same as any other site using
Get. By using the backslash we’ve told Google to use this next character literally instead of a
Google Parameter.
Patched and I’m mad. Separating each part of the query is completed with a backslash with
a space before it. Meaning you can do anything after that first space backslash ‘ \ inurl:’.
This is extremely useful and I use it in almost every Dork.
E.g 2a
(“Shopping” + cart) \ ext:php \ inurl:?cartID=
Revision: You can now separate the importance of each section of the query with
backslashes to expand the search query. This was a recent development from the Google
Update. This allows for unique results and is extremely useful.
E.g. 2a (patched…)
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Now a big part of this book is teaching you how these Dorking solutions actually achieve
results. Now it’s a reasonable time to explain most of these Regex Options. Now our best
place to start is the order I’ve listed them all in.
Wildcards
Wildcards are our way to expand our search results, avoiding our failed Dorks while
generating or mistargeting. Human Error is a large concern for Dorking. Whether it’s been
from the Dorker (us) or other users of the internet (BOOMERS). So, it’s vital to optimize our
chances of success. In this following section of the book I will be explaining each wildcard
and usage.
.
Our period is a useful tool when targeting a numeric target or a string of characters towards
a subject. Whether your target be for a game, event, year. Anything like this can be
optimized to assist to randomize that result to be anything.
e.g.
Zelda Event 201.
This usage of the period will now target results with 201[SOMETHING]
Results can give you a year, a number of an item or anything in this usage technique.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Usage of a Question Mark can assist in the reverse searching for context and stringed
keywords or something else.
e.g.
?games events London
In this context, characters before games could be linked to the word, could be strung
together in a phrase or simply be in the URL: top-ps4-games
e.g.
games? events London
In this context, the “s” on the end of game will be non-required when scanning through
sites, I’m unsure of the extent this is capable in Google.
+
The potential uses of this operator are flexible. Being able to complete multiple tasks, either
adding a dynamic random character to the end of a specific word or by linking multiple
words to be together or as a priority in the search query itself.
e.g.
How to multithread in C# with 10+ at the same time
This usage of the operator will now search for queries of 10 with another character after it,
being a number or letter. Either way can assist in searching legal documents or just
attempting to expand the search boundaries.
e.g.
Game + popular events
This use of the operator will result in stringing both queries together, Google has a hidden
way of completing this as it’s a rather complex algorithm they’ve developed but it’s a very
useful and commonly used practice by Dorkers.
*
Usage that follows this operator is similar to the previous but instead of colliding the queries
but can also randomize the results, with an increase to the beginning or the end of a
numeric query or just randomize the strings in the query.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
e.g.
How to multithread in C# with 10* at the same time
Result is simply just randomizing that next character, also and most commonly used is to put
it before and to randomize the figures after that number / query as well.
e.g.
|
This operator means, OR, which means it will choose one or the other. This is the same
syntax usage of “+”.
e.g.
Game | popular events
Meaning, “Game OR popular events”
This is not an overly used operator. I won’t spend time explaining this.
Regex Groups
Regex groups are how we can organise our search queries within a query to achieve searching for
multiple pieces of information in a singular query. We can also use Wildcards to assist the accuracy
of these searches, increase the diversity and improve the results. Now this is what really makes the
advanced Dorkers good at what they do.
()
Parenthesis are a useful tool to increase priority in searching or link queries together. I personally
use these most commonly in searching. It’s a vital component when linking multiple queries together
and making them a priority along side your Search Functions and other Regex Usages.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
e.g.
(Gaming Shops Local) ext:php
This usage is linking the entire phrase / query into a priority queue, instead of Google
searching for each independent word, instead it will now attempt to find these words strung
together, or close to it.
Be aware that once you incorporate Search Operators / Wildcards you will be drastically
optimizing your Dorks to complete multiple tasks at the same time. You will be making
Google process multiple requests, also improving the accuracy of your search.
[]
Data arrays, for anyone who’s been a developer or participated in the numeration
techniques of coding. Will know that arrays are pieces of data of which can be called, and
then find a certain entry to that array and use that data, as a static piece of information. We
can use this to randomize our searches with numeric orders or to simply incorporate
random characters into the search. Be aware Google’s array inputs each unique character as
a separate entry to the array. No commas to be required and adding them may even corrupt
the search intent.
-
This operator is used inside of the Data array in the previous explanation. This is just to
define the distance between two characters. Like when counting, instead of putting 1, 2, 3,
etc into the array. Simply putting the starting number followed by this operator and then
the finishing number to have it automatically targeted. Can also be used to avoid targets.
Such as github.com. But it isn’t much of a concern for us and will waste our space for a
query.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Google optimizes its results in relation to what’s searched, how often that or a similar search is
made, and what is clicked from those searches.
This is important because we can utilize GRS and EGS to create an expansive result count and
therefore improve final product results.
If you want to target a directory, page, parameter or other information in the URL of the target, use
inurl:
If you want to target a domain attribute (your .com, .net, .us, forum.), use,
site:
These are your URL targets, our primary targets only in the URL of the results that we want to target.
By targeting these properly your results are 100% guaranteed to be relative to those targeting
features due to the Search Function. This will reduce results, purely because it’s a more refined
query, quality over quantity. Other Search Functions have their own purpose, these are primarily for
current syntax and targeting.
Testing Dorks
Another important skill to Advanced Dorking is being able to tell what’s a good, and what’s a bad
Dork. The ideal Dork for SQLi Get is having the targeted parameter highlighted in the URL of the sites
shown to you by Google and the relevance to your target.
Easiest and most logical way legitimately put it into Google manually and check a few pages. Ensure
that “Big Brands” aren’t the only results, like Facebook, Amazon, or other major sites that can be
never vulnerable. This is one form of results poisoning or soft banning on Google and is a huge flaw.
Another thing to watch out for is URL’s that look either; completely random or are IP’s. This is
because they’re usually honeypots and pose a threat to getting any results. Another valid point to
take avid consideration of is if you get a static 8 URL’s on that Dork, even if you change some of the
variables. This is restriction of results by Google to stop what we do, Bing does it as well, but Google
is much easier to notice. Another method of this is when the first page states there is lots of results,
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
then once you go to the next pages it says there is no more or that they’re repeated and to show the
omitted results (it stops u several pages after). All these tests are important to avoid creating invalid
or result poisoning Dorks.
Regex Dorking
Regex Dorking is built around the Regex provided by Google. Understanding how to use our Regex
Wildcards and other Regex Operators are extremely useful. Regex Dorking is containing of multiple
Search Exploits and other private methods of Dorking which are NEW and NEVER USED BEFORE. But
these will not come yet. The core concept of Regex Dorking is understanding how Search Functions
operate.
inurl:
has no spaces, quotes and equal signs do not get read.
ext:php
YOU CANNOT PUT SEARCH OPERATORS DIRECTLY BEFORE OR AFTER SEARCH FUNCTIONS.
Targeting Parameters
Unless something is specified implicitly to be targeted elsewhere than the text with a Search
Function, what characters you put there are keywords.
inurl:?param=
Be sure to consider if the target will be considered in the DB of your target, what will be stored and
will be it be called onto the page from that parameter. It’s the most important logical query to
consider when choosing parameters.
In respects of the common directory Dorking method there is no space between a page name and a
page extension, being the only instance there is no space before the page extension.
E.g.
cart.php
but in all other valid instances it’s not proper to target in this manner, this is because this is just a
directory. Also, this is without considering the NEED to use Search Functions to define where this is
targeting. This is simply an example of what is being targeted.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Google operates on Queries, Operations and User Settings. It’s literally built around your most
evident to click, your user data (country, time, location, cache, etc), the query you enter and the
operations you use to optimize that search. This knowledge is how some Google Regex System
mistakes are made.
Filters (filter={0})
Connector of commands/settings (&)
Amount of URL’s per page (num={number})
EG.
Utilizing this can allow you to improve your Dorks without actually using Dorks.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Here, the results are 500 URL’s, mostly containing all the information that was searched for in the
query. The important thing to recognise here about this Dork, is that the results do not all mirror
that numeric figure, this is because Google will broaden results to attempt to assist us in finding
what we’re searching for. This can work against us in moments where there are too many URL’s in
the results, and other times can work perfectly as needed and provide us alternatives even if our
query is invalid and could not return a response matching all given criterion.
E.g. 2:
This Numeric Figure can be changed to increase or improve the results. This allows you to use GRS to
target sites with an expanded view. This is because Google only shows URL’s specific to your search.
So, continue adding to that number and continue creating Dorks and finding unique targets. There is
a large amount of opportunity in this form of Dorking. This also works in Search Functions!
It’s extremely important to avoid using complex Dork types when using this method to avoid the
query returning null.
Keep it simple!
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
The main method to finding your initial error messages is to go find a site that has an index of them.
This is usually found on the vendors site directly. From there you just need to find errors that
present on the front end of the site and have some fun, find a huge list and just expand it constantly.
This method of Dorking has proven useful to individuals in the community, although not perfect it
can present some success. It’s suggested to play with this at least once with Dorking, it’s a lot of fun
making a list and getting started, and it’s rewarding in the end as you might find something really
cool.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
E.g. 1
As seen in this example, the get parameter, ‘id=’ is
being searched. The error that is being searched for on
the page HTML is, “Warning: mysql_fetch_assoc()”.
With this information Google has derived almost
twenty-eight thousand URL’s from its index.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
If this isn’t clear, the error messages go where the data from the database SHOULD HAVE been.
This form of Google Dorking has been abused since 2010, it is not a private method and I will not
spend time compiling a list of hundreds of these error messages. You have a brain; you’ve proven
that by obtaining this book and reading this far. Google a target of yours, the ability to think
independent is what makes you good at this field. Not by following a guide word for word.
For example:
In the above images there are lists of errors on the page. Grab one you don’t have in your list like:
“Warning: mysql_fetch_array() expects parameter 1 to be resource”
then go Google this query
intext:“Warning: mysql_fetch_array() expects parameter 1 to be resource”
Then go back to step one, find new errors and do it again. Adding to your list.
Another way to expand this success rate is to add parameters to the search. This is because it will
increase the injection rates and get unique URL’s. Enjoy!
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
1. You can only use it on Search Functions that allow for Spaces or without a Search Function
2. Experiment with the GRS to optimize unique results
Stringed Dorks is about giving a string of Keywords linked together via GRS to create a randomized
order of search to Google. Leaving it the ability to expand the results and therefore providing a more
intense search. This can result in URL’s that haven’t been vulnerable to other methods of Dorking
and also provide an experimental side to using Dorks.
intext:game*Forum?Link
intext:game?Forum*Link
intext:game*Forum*Link
intext:game?Forum?Link
As you can tell, this usage of Stringing is using Wilcards. This is because it allows for diversity in the
results but still meets the demands of your search. From this you could increase or reduce the level
of Keywords. Add Parameters or Default Locations / Files or any myriad of opportunity. These Dorks
are something I’ve never seen publicly and intrigue me far more than any other I’ve seen from all of
my discoveries of Dorking.
Another Method of Stringing is also utilizing our Operators to link queries together to obtain results
that match that query. This is usually completed with parenthesis’ and can be utilized in a myriad of
ways.
This is querying the keywords together, making it possible to utilize the search around the keywords
in an order as well as specific requirements of being together. It’s a useful tool and can be used to
string certain requests together.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Extended Dorks:
This is simple and works the exact same.
This can be used to expand Parameter Searches or Directory Searches. There are other practical
usages which have been proven less effective but it’s certainly a topic of dabble. But for the sake of
being comprehensive I will cover all angles of this method to truly be complete on the topic.
As seen above there are 3 different Parameters. Bound together by an OR Operator. This is
useful because we can make Google select appropriate results. Another interesting factor is
the Page Extension criterion, this just reduces the count of URLs without Parameters, it’s not
compulsory and it’s suggested to play around with this method.
Now the extension for these extended Dorks that correlates with the information provided
in a later chapter. This will allow a unique usage that provides a regex exploit for Google,
spoilers I know.
You will understand the functionality of this Dork once you read the chapter on exploits for
Google Searching. Just remember with this syntax decision to use a \ after the inurl: to avoid
syntax errors resulting in appalling URLs.
ext:php inurl:how+to+download+fortnite
This method is simply just putting a string of keywords together with + and using it with
inurl: and this is utilized to find unique results although has grown popular over previous
years as more people have understood its advantages.
It’s highly suggested to find further methods of this avenue as they’re usually undiscovered or show
significant purpose or succession. It’s also important to utilize the tools at your hands, you have
Google; TRY EVERYTHING! Google is very accommodating for search availability so you may as well
try everything out with the aspirations of succeeding.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Chapter 10, Dork Types | The Right, The Wrong, And The Bullshit..
Dork types has been a rather polarizing topic brought up in conversations with buyers.
The simple answer is, Dork Types are 100% how you make them, but you need to follow rules. So, in
this chapter I plan to expose common bullshit in the community and also provide correct syntax
examples and common Dorks and their logic. Leaving you to expand from that field of knowledge to
further expand your ability to perform and surpass the regular Dorker to become a King of Dorking.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Anti-Parameter Dorks
Anti-Parameter Dorks are built off a Regex Exploit for ext:.
This is iconic importance behind this is that there is no demand to target parameters anymore. E.g.
ext:php ?
The ? is a Regex Exploit that seems to improve the rates of ? being in the URL. This is seemingly
because ext: doesn’t close the string when a regex exploit is after a space. It’s extremely weird but I
will not complain in the slightest.
Comma Dorks
Comma Dorks improve URL rates, do I know why? Nope, do I care? Nope.
e.g.
e.g.
inurl:? id|game|tracking
inurl:? asp|aspx|php|pdf
inurl:? store.php|game.php|/game/|/store/
inurl:? store.php
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Examples of this is like the Driver used in our Parameter Method. This is using an older Driver that
can and has been proven to be susceptible to SQLi attacks and other vectors. This allows us the
availability to find other resources through sites like GitHub, Database Managers, Older Coding Site
Suggestion Articles. These resources we have access to allow us unique pivot points for our Dorking
that other people do not consider when creating Dorks.
But how do we find these resources? What do we search for and how to we interact with this
information?
1. Find a target, whether it be DBMS’s (Database Management System Drivers or Site Plugins
(like for Wordpress, or other systems). IMPORTANT: to get SQLi you need to find plugins or
drivers that interact with the DBMS. To find these, it’s suggested to use keywords like
“Portal”, “Plugin”, “Cart” or “Login” to find these resources. Another way is to think like a
developer and try out what they would have to search to find these systems.
2. Understand PUBLIC indicators that this site is operating this. (Parameters, Directories,
Trademarks, Banners, Footers), also understand if it’s a protected part of the site you’re
targeting or something accessible by everyone, (this is key for the next step)
3. DORK!
It may seem basic, but that’s because it is. A good example is one that a student discovered.
inurl:d_blog_module
This is a management system for open cart payment gateways released in 2014. Yet this student was
able to get outstanding results. Simply find systems like this through the resources above and utilize
them to find unique Plugins and Drivers to find some results probably no one else has. It’s an
extremely versatile method of Dorking and can be used to expand the results of your Dorks and
extend your knowledge as well. It’s highly suggested to play around with this method and find
something that suits you and to enjoy it.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Exposure Dorks are nothing special and are being countered more and more regularly, so therefore I
find no need nor point to explaining those Dorks. So rather I will be explaining the Psychographic
responses of users on the internet to help you find and determine targets susceptible to exposing
their Primary Password with the rest of the world.
Psychographic Understanding
The understanding of the mind is built up of behavioural patterns. The one most important for this
chapter being the level of trust that people have for large organisations and how they can stretch
that trust to sites like mail outlets and shopping sites.
The primary understanding to keep it extremely simple. People trust big brands, if they see another
company using the similar interface (Amazon to another smaller retail shop) they will seem to trust
that small shop as well. And those can be highly susceptible to our attack vectors, giving us the
unique opportunity to pinpoint this over trust. Same for smaller newspaper articles and sometimes
some bigger ones. You can also experiment this in many other places where you find yourself
reusing passwords for different fields.
This understanding of how people partition, and clump information together can allow us the unique
opportunity to exploit the laziness of these people.
So, getting the goal of email access Dorks is pretty simple, target people, not the result. People are
the weakest link in security and leave availability for mistakes to be capitalized on. Think where you
may reuse your passwords and target those, what’s big in the media, what finds its way from the
bottom to the top of the internet and target those categories. Use that knowledge from those
categories to expand your email access Dorks to a level where you actually get decently consistent
hit rates. It’s been seen like in the dump of Zynga, (the shopping company) that people reuse those
same passwords from shopping to email. And it leaves that avid opportunity for people to exploit it.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
For this chapter on Dorking, there will be a coverage of Default Directories, Common Directories and
the advantages of targeting them in multiple instances. Directories on a webserver are the location
of files that are being called to the site front end (client end, what we see) which indicate where to
call the information from and mirror the compiled code. This is an important piece of information
because without this we cannot comprehend this topic. A lot of premade sites or other services are
too either mangled together or complicated for developers to bother rewriting to work in a different
format. This is an advantage to us because once we find something that’s popularly vulnerable, we
can target it regularly.
A good example of this is if we were to be targeting the default webapp visitor page of php sites.
index.php
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Google is expensive to parse but with recent api’s in usage that are cheap like the one used by
BingO. There are advantages to parsing Google. Simply because there is just more URL’s to be
scraped. Bing is cheap to parse but it’s got very few rewarding URL’s and is just really difficult to
target on.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Dorking is built around the construct of simplicity, success and efficiency. The most ideal way to
meet most if not all of those criteria is to generate Dorks. BUT, will not always sustain the same
quality of Dorks and therefore can cause consequences when adding up expenses of parsing and
paying for proxies.
Solution:
Manually organise your Dork Types to use a singular Keyword Variable and manually sort your
keywords with their operators and put into that singular file. The advantages are that you can
control which keywords are together, allowing you the customization that regular Dork generation
doesn’t. Unfortunately, it’s very time consuming an takes commitment, but it’s avidly rewarding so
you can pick and choose your battles on the topic.
Solution:
Dork Analysers! There is a feature in a few tools called a Dork Analyser, its primary purpose is to
parse the Dorks and scrape how many URL’s are in the results for each Dork and then if they’re
below a certain threshold they will be removed from the Dorks in the results file. It’s a useful tool
and other Dorker’s use this and sell those Dorks as “Filtered Dorks”. It’s certainly appealing a lot of
buyers as it meets their needs of high success rates that justify and almost guarantee their expenses.
There are risks to this though, some Dorks will return false positive URL rates so that Google can’t
redirect Hackers to honeypot sites to track their usage on those sites. It’s an avid threat but if you
follow the syntax requirements in this book there shouldn’t be a great concern for this topic.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Handwritten Dorks
Handwritten Dorks have a different advantage to Generated Dorks. Not ideal for time efficiency or
the creation of mass lists of Dorks but can allow for the advantage of customization and
specifications. With this method you can target certain directories or other regex features for
specific parameters, keywords and other factors. This is in the manner that you can customize it
uniquely for that Dork making it the highest quality of that Dork around and also providing unique
results in relation to your changes.
Problems…
It’s time consuming and not rewarding for mass targeting. Honestly, I’d rather integrate Handwritten
into Generating any day. There are fixes to the problem of speed with Handwritten. If you’re okay
with time consumption and hand checking each Dork then do it, by all means do it, but it isn’t as
rewarding as it used to be. Generators are too fast, too strong and too customizable now.
Handwriting Dorks cannot compare.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Most commonly renowned of exploits is the vBulletin and AWS S3 ones that have stormed the
internet over recent years. Known exploits like these are not the point of this chapter as they will
have already been exploited by other people, instead this chapters is made for people who find
exploits while they’re 0-day and need assistance with targeting them; And fortunately it’s actually
easy (most the time).
A perfect Google Dork-able exploit is vBulletin, renowned for its footer, making it simplistic to target.
Other exploits for more protected sites can be harder, but the same logic applies.
vBulletin versions before 5.x.x have a footer stating it’s a vBulletin forum and also has what version
of vBulletin.
intext:“Powered by vBulletin”
Unfortunately, over time they decided to make the branding of which version selective for payers of
5.x.x. This can be bypassed by the fact they’ still have “All times are GMT” in the footer.
For more complicated targets though, other noticeable indicators like directories, footers, headers
and branding can be used to target on Google. You can find these important factors to use when
targeting the sites that could potentially be vulnerable to your 0Day. Google can only show you
indexed data from the page and cannot show you information to target that isn’t visible to the user,
which is the biggest downfall to Google Dorking aside from IP Restrictions.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
Bing and Google have different Operators and Search Functions. They also have different
capabilities. This is rather boring because Bing is inaccurate and just painful to use. I honestly can’t
bother Dorking on it but due to the mass demand for me to learn it to help everyone. There are a
few negative updates that have stopped using URL targeting search functions properly and other
operators. This has caused for a decrease in success using Bing.
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried
Revision 3 and this had their name Kings of Dorking Please Don’t Leak
I tried