Table of Contents

Google Dork Monitoring

Introduction

Google hacking, also known as Google dorking, is the practice of using advanced operators in the Google search engine to find security vulnerabilities in websites. These operators can be used to search for specific file types, sensitive information, and other vulnerability-related information. It is often used by security researchers and hackers to find vulnerabilities in websites and networks. There are google Dork lists like https://www.exploit-db.com/google-hacking-database which can be used in combination with your domain. If any result appears in Kaduu, it means that there is a possible security vulnerability or data exposure in one of the webservices of your organisation.

What vulnerabilities can be exposed using google hacking?

Google hacking can be used to expose a variety of vulnerabilities in websites, including:

How to use Google Dork Monitoring?

Please enter you domain like "example.com" and not "www.example.com" to not limit the results to a specific server. The domain you enter will be queried once per day using a Google API call. If there are any results, you can see them by clicking on "view". You will see all the alerts that have been triggered using your keyword. The query type will reveal what keyword has triggered the alert: