Top 30 Google Dorks Every SOC Analyst Must Know
If you are a SOC Analyst, you must be aware of how important Google search operators are while performing reconnaissance, OSINT gathering, or vulnerability assessments.
In this article, I have covered the top 30 Google Dorks Every SOC Analyst Must Know. I have also added explanations and practical examples that help you understand it more easily.
To know the right Google search operators allows you to uncover sensitive data, exposed directories, login pages, and vulnerable files that are often left unintentionally public.
So without any further ado, let’s start…
List of 30 Google Dorks Every SOC Analyst Must Know
| Dork | What It Does | Example | |
|---|---|---|---|
| 1 | site: | Search within a specific domain | site:example.com |
| 2 | inurl: | Find pages with keywords in URL | inurl:admin |
| 3 | intitle: | Search pages with keywords in title | intitle:login |
| 4 | allintitle: | All words must be in title | allintitle:admin login |
| 5 | intext: | Find specific text in page content | intext:”confidential” |
| 6 | filetype: | Search specific file formats | filetype:pdf site:gov.in |
| 7 | ext: | Same as filetype | ext:xls password |
| 8 | allinurl: | All words must appear in URL | allinurl:admin login |
| 9 | cache: | Show cached version of a page | cache:example.com |
| 10 | related: | Find similar websites | related:paypal.com |
| 11 | link: | Pages that link to a URL (limited) | link:example.com |
| 12 | info: | Info Google has on a site | info:example.com |
| 13 | ” ” (quotes) | Exact phrase match | “index of /backup” |
| 14 | OR | Search for either term | admin OR login |
| 15 | AND | Search for both terms | admin AND dashboard |
| 16 | – | Exclude a term | login -facebook |
| 17 | * | Wildcard for unknown words | “admin * panel” |
| 18 | define: | Find word definitions | define:malware |
| 19 | intitle:index.of | Find open directories | intitle:”index of” “mp3” |
| 20 | site:*.gov | Search all .gov subdomains | site:*.gov filetype:xls |
| 21 | site:github.com + inurl:env | Exposed .env files on GitHub | site:github.com inurl:.env |
| 22 | filetype:xls intext:password | Excel files with passwords | filetype:xls intext:password |
| 23 | filetype:sql “insert into” | SQL database dumps | filetype:sql “insert into” |
| 24 | filetype:log password | Log files with credentials | filetype:log password |
| 25 | filetype:conf | Configuration files | filetype:conf apache |
| 26 | filetype:env | Environment variable files | filetype:env DB_PASSWORD |
| 27 | inurl:/phpinfo.php | Find PHP info pages | inurl:/phpinfo.php |
| 28 | intitle:”index of” db | Directory listings for databases | intitle:”index of” db |
| 29 | site:pastebin.com password | Password leaks on Pastebin | site:pastebin.com password |
| 30 | filetype:txt “username password” | Text files with credentials | filetype:txt “username password” |
Conclusion
Above is the list of almost the most essential Google Dorks that you should know as a SOC analyst. I hope you find this post helpful. If so, then share it with someone who this post can also help. Moreover, if you’re someone looking to start your career in SOC, you can enroll in our SOC Analyst training in Hyderabad at SOC 360.