Govind is a 4th year computer science student with roll number 2312181. The document discusses Google dorks, which are advanced Google search techniques used by hackers to find security vulnerabilities on websites. It describes basic Google dork commands like "Google pond" and "Google gravity" that produce interactive effects when executed on Google.com. The advantages of Google dorks are listed as finding hidden files and links and producing accurate results quickly. Disadvantages include some tricks not working on Internet Explorer and requiring an active Internet connection. In conclusion, Google dorks use Google search to find website security issues.
3. 3
What is Google dorksWhat is Google dorks
Advanced Google searches used to find
security loopholes on websites and allow
hackers to break in to or disrupt the site.
Google hacking is a computer hacking technique
that uses Google Search and other Google
applications to find security holes in the
configuration and computer code that websites
use.. It's not hacking into Google servers!
• It’s just using Google search techniques to find exactly what we
actually need.
4. 4
• Displays better attractive search results
. Eaisly to learn
• Shows hidden tricks and links also
Benefits of Google dorks (Hacking)
5. basic operation(tricks)
• go to google crome
• find the search part
• click
• write a google commands
• press enter
• tricks will be start
5
6. 6
Google Commands (tricks)
Google allows the use of certain operators to help refine searches. The use of
advanced operators is very simple as long as attention is given to the syntax.
The basic format is:
operator:search_term
Notice that there is no space between the operator, the colon and the
search term. If a space is used after a colon, Google will display an error
message. If a space is used before the colon, Google will use your intended
operator as a search term.
7. 7
Most used Google CommandsMost used Google Commands
google gravity
google sphere
elgoog /google mirror
google terminal
google guitar
zerg rush
atari breakout (like games google pacman ,google snake game)
do a barrel roll
hiphop dance
fetivus
google pond
any more avialable
12. Google pond
• Simply Follow the
Steps and experience
the effect of pond in
Google :
• Goto google.com
• Type “Google Pond”
• Click on I am feeling
lucky.
• Now hover(move)
the Mouse & experience
the effect.
12
13. Google terminal
Simply Follow the Steps and experience the effect of
pond in Google :
Goto google.com
Type “Google terminal”
Click on I am feeling lucky.
Now hover(move) the Mouse & experience the effect.
13
14. Google guitar
Simply Follow the Steps and
experience the effect of pond in
Google :
Goto google.com
Type “Google guitar”
Click on I am feeling lucky.
Now hover(move) the Mouse &
experience the effect.
14
15. google gravity
Simply Follow the
Steps and experience
the effect of pond in
Google :
Goto google.com
Type “Google gravity”
Click on I am feeling
lucky.
Now hover(move)
the Mouse & experience
the effect. 15
16. google sphere
Simply Follow the Steps and
experience the effect of pond in
Google :
Goto google.com
Type “Google sphere”
Click on I am feeling lucky.
Now hover(move) the Mouse &
experience the effect.
16
17. elgoog /google mirror
Google is a most
popular search engine
elgooG (Google
spelled backwards) is a
mirror image of the
Google search
engine,just for making
fun.
17
18. Hiphop dance code (java script)
• javascript:(function(){function c(){var
e=document.createElement("link");e.setAttribute("type","text/css");e.setAttribute("rel","stylesheet");e.setAttribute("href",f);e.setAttribu
te("class",l);document.body.appendChild(e)}function h(){var e=document.getElementsByClassName(l);for(var t=0;t<e.length;t++)
{document.body.removeChild(e[t])}}function p(){var
e=document.createElement("div");e.setAttribute("class",a);document.body.appendChild(e);setTimeout(function()
{document.body.removeChild(e)},100)}function d(e){return{height:e.offsetHeight,width:e.offsetWidth}}function v(i){var s=d(i);return
s.height>e&&s.height<n&&s.width>t&&s.width<r}function m(e){var t=e;var n=0;while(!!t){n+=t.offsetTop;t=t.offsetParent}return
n}function g(){var e=document.documentElement;if(!!window.innerWidth){return window.innerHeight}else if(e&&!
isNaN(e.clientHeight)){return e.clientHeight}return 0}function y(){if(window.pageYOffset){return window.pageYOffset}return
Math.max(document.documentElement.scrollTop,document.body.scrollTop)}function E(e){var t=m(e);return t>=w&&t<=b+w}function
S(){var e=document.createElement("audio");e.setAttribute("class",l);e.src=i;e.loop=false;e.addEventListener("canplay",function()
{setTimeout(function(){x(k)},500);setTimeout(function(){N();p();for(var e=0;e<O.length;e++)
{T(O[e])}},15500)},true);e.addEventListener("ended",function(){N();h()},true);e.innerHTML=" <p>If you are reading this, it is because
your browser does not support the audio element. We recommend that you get a new browser.</p>
<p>";document.body.appendChild(e);e.play()}function x(e){e.className+=" "+s+" "+o}function T(e){e.className+=" "+s+"
"+u[Math.floor(Math.random()*u.length)]}function N(){var e=document.getElementsByClassName(s);var t=new
RegExp("b"+s+"b");for(var n=0;n<e.length;){e[n].className=e[n].className.replace(t,"")}}var e=30;var t=30;var n=350;var
r=350;var i="//s3.amazonaws.com/moovweb-marketing/playground/harlem-shake.mp3";var s="mw-harlem_shake_me";var
o="im_first";var u=["im_drunk","im_baked","im_trippin","im_blown"];var a="mw-strobe_light";var f="//s3.amazonaws.com/moovweb-
marketing/playground/harlem-shake-style.css";var l="mw_added_css";var b=g();var w=y();var
C=document.getElementsByTagName("*");var k=null;for(var L=0;L<C.length;L++){var A=C[L];if(v(A)){if(E(A))
{k=A;break}}}if(A===null){console.warn("Could not find a node of the right size. Please try a different page.");return}c();S();var
O=[];for(var L=0;L<C.length;L++){var A=C[L];if(v(A)){O.push(A)}}})()
18
19. 19
• Displays hidden files and links
• Shows exact accurate results
• Takes less time to search
•Google allows the use of certain operators to help
to refine searches.
Advantages
20. 20
•Internet explorer not perform this tricks.
•Without internet that tricks not possible.
•Complex tasks.
•All depends on the trustworthiness of the ethical hacker.
DISADVANTAGES
21. 21
It is a computer hacking technique that
uses Google Search and
other Google applications to find security
holes in the configuration
and computer code that websites use.
Conclusion