Best Dorking Tutorial Book

  • Post category:Tutorials
  • Reading time:3 mins read

Dorks Category

 

Introduction

Dorking is the art of understanding and utilizing a search engine to emit the desired results. If I wanted to find a file on anonfile; I can go on Google and use this search query, inurl:anonfile.com + Target File. I can find a Tweet with the exact same syntax, and I can repeat this for almost any target that is at public discretion and isn’t banned from Google. Here we post one of the best dorking tutorial book.

What is a Dork?

A Dork is a search query that a search engine can read and interpret to provide the most precise URLs that correlate to that query.

Why do we use Dorks?

Cracking is, at its simplest form, finding basic, unprotected sites, compromising its security measures or lack of; exporting information of which is desired and then use them for other purposes. This is important because this next part will be complementary to our injection criteria.

Chapters

  • Chapter 1 : Dorking
    • What is a Dork?
    • Why do we use Dorks?
    • Forms
    • Keywords
    • Page Extensions
      • Files Page Types and Page Extensions
  • Chapter 2 : Syntax (Google)
    • Quotation Syntax
    • Ordering & Capitalization
      • Ordering
    • Extended Search Operators Syntax
      • Search Operator List
      • Search Functions
  • Chapter 3 : Let’s get Started
    • Basic Dorks
    • Complex Dorks
    • The Big Questions
    • How to make Dork Types
    • Keywords and Parameters
    • More Advanced Keywords
    • Parameters
    • Parameters Detailed
      • Testing Parameters
    • Parameter Methods
    • Advanced Dorking
  • Chapter 4 : Syntax
    • Google Regex System
    • Regex Wildcards
    • Regex Groups
    • Regex Escape
    • GRS
      • Advanced Explanation and Usage for GRS
      • Wildcards
    • Regex Groups
    • Breaking Regex & Syntax
  • Chapter 5 : Extensive Google Syntax
    • Basics and Rules
    • Testing Dorks
    • Regex Dorking
    • Targeting Parameters
    • Page Extensions | When to Target
    • Bypassing Google Bot-Detection
  • Chapter 6 : Google Search Settings INURL
  • Chapter 7 : Numeric Dorks
  • Chapter 8 : Database Errors | Vulnerability Method
    • Most Known SQLi Error Vulnerability (Stupidity Error)
    • Less Known Error Dorking
    • True Error | Unsearched but Practical
  • Chapter 9 : Stringed / Extended Dorks
    • Stringed Dorks
    • Extended Dorks
  • Chapter 10 : Dork Types | The Right : The Wrong : And The Bullshit
  • Chapter 11 : Google Search Exploits
    • Anti-Parameter Dorks
    • Comma Dorks
    • inurl: Spaces via Regex Exploit
  • Chapter 12 : Dorking for Plugins and Drivers
  • Chapter 13 : Email Access Dorks |Exposure | Psychographic
    • Psychographic Understanding
  • Chapter 14 : Default Directory Dorks | Common Directory
  • Chapter 15 : Bing vs Google
  • Chapter 16 : Generating vs Handwriting
    • What are Generated Dorks?
      • Problem 1 | Mismatch Combinations
      • Problem 2 | Invalid Dorks (Killing Proxies)
    • Handwritten Dorks
    • What are Handwritten Dorks?
    • Problems
  • Chapter 17 : Exploitation Targeting on Google
  • Chapter 18 : Administrator Panel Targeting
  • Chapter 19 : Bing A-Z
  • Chapter 20 : Post SQLi Targeting
  • Chapter 21 : LFI Targeting
  • Chapter 22 : Public WWW | Vulnerability & Exploit Targeting
  • Chapter 23 : Google vs Google API (Custom Search Engine)
  • Chapter 24 : GitHub Dorking

 

Download


4.2/5 - (13 votes)

This Post Has 2 Comments

  1. adony

    good

  2. l4p4

    top

Leave a Reply