Google dorks are special search terms that can help you find hidden information or vulnerabilities on websites.

1. My Favorite Google dork

Start with "site:<domain>". Then, exclude boring pages with "-www" or other terms until you get to the juicy stuff:

site:tesla.com -www -shop -share -ir -mfa
None

2. Pastebin Leaks

Check out sites like pastebin, jsfiddle, and codebeautify for code left over from developers:

site:pastebin.com
site:jsfiddle.net
site:codebeautify.org
site:codepen.io "tesla.com"
None

3. PHP extension w/ parameters

Use "ext:php" and "inurl:?" along with the domain to find .php files with a question mark in the url:

site:tesla.com ext:php inurl:?
None

5. Disclosed XSS and Open Redirect Bug Bounties

Look through both fixed and unfixed bug bounties publicly disclosed through OpenBugBounty:

site:openbugbounty.org inurl:reports intext:"yahoo.com"
None

4. Combine your dorks

Use the "|" operator to include both queries or the "&" operator to require both queries. Here's an example of attempting to search for file upload endpoints across multiple domains:

(site:tesla.com | site:teslamotors.com) & "choose file"
None

Bonus Dork: Alternative search engines

Try other search engines like DuckDuckGo, Bing, Baidu, and Dogpile to further expand your findings.

None

Be sure to check out the following resources for even more Google dorking tips and tricks:

Follow me on Twitter for daily hacking tips:

https://twitter.com/TakSec

Happy hunting!

The Gray Area is a collection of great cybersecurity and computer science posts. The best articles are highlighted in a weekly newsletter sent out every Wednesday. To get updates whenever The Gray Area publishes an article, check out our Twitter page, @TGAonMedium.