TopTechpal

World of Tech
Menu
  • Home
  • Tech News
  • Tips And Tricks
  • Technical Tutorials
  • Premium content
  • Latest leaks
  • Paid gone free
  • Others
  • Apple Music Code Generator
  • Donate us
Tips And Tricks

Use Google effectively like pro | Google secret | 2022 Hacks

Roshan February 4, 2020

Today we will learn about Google secret which we can use for hacking and gaining information and also for fun. Don’t loose hope or get bored by seeing so much of information. I can gurantee that these informations are explained in most easy way ever in internet. We will discuss many google secrets, hacks and tricks which we can use for gaining everything that exists on google like movies, leaks, TV shows, Courses, etc and also for hacking purposes. Let’s learn everything about google secret and learn to use it effectively like pro.

Note: things you learn here are only for education purpose. You are responsible for everything you perform and we will not be held responsible.

So let’s learn everything about google and how to use it like hacker.

Contents hide
1 Part 1. Google secret Words to use for effective search results
2 Find any movies and shows that exist on google
3 Part 2. Use Google tricks for fun
4 Part 3. Use of Google secrets in hacking
5 what is google dork?

Part 1. Google secret Words to use for effective search results 

1. Use of “Site” while searching restricts results to specified domain
For example: “site:toptechpal.com netflix” will find all results in that specific site containing the word Netflix. It can be used to find results within specific site.Google secret

2. Use of “intitle” restricts results to documents whose title contains the specified phrase
For example:” intitle:Netflix hack” will find all sites with the word Netflix in the
title and hack in the text.

3. Use of “allintitle” restricts results to documents whose title contains all the specified phrases
For example: “allintitle:Netflix hack” will find all sites with the word Netflix and hack in the title, so it’s same as using

intitle: Netflix

intitle: HackNetflix hack

4. Use of “filetype: extension filename” restricts results to documents of the
specified type
For example: filetype: mp4 Joker will show videos containing the word joker, while filetype: pdf SAT Course will show PDF files with the word SAT Course.Free movies

5. Use of “allintext” restricts results to documents containing the specified phrase in the text
For example: allintext:”Netflix hack” will shows results which contain the phrase Netflix hack in their text only

6. Use of “inurl: xyz.com intext: we want to search” will restrict search results withing URL with that specific text

For example: inurl: toptechpal.com intext: pubg hack file, this will show pubg hack file word in text containing in toptechpal.com in url. Also inurl: mediafire.com intext: Spotify mod apk shows spotify mod apk uploaded on mediafire.Use google for hacking

7. Use of “+” specifies that the phrase should occur frequently in results.

For example: +Netflix will shows results by higher number of occurrences of netflix in post or documents.

8. Use of “” delimiters for entire search phrase.

For example:”SAT courses” shows documents or results which contain only netflix hacking techniques.

Find any movies and shows that exist on google

Search in this format

Movie name google docs

For example: Pirate of Caribbean google docs

[Movie Name] -inurl:(htm|html|php|pls|txt)intitle:index.of “last modified” (mkv|mp4|avi)

This will shows many results of with Download link of movies only. Just follow the links with “index of movie name” and download your file

For example:
[fast and furious] -inurl:(htm|html|php|pls|txt)intitle:index.of “last modified” (mkv|mp4|avi)Google secrets

or alternative

“index of movie or shows name” also work most of time.

For example: Index of flash, this shows file with download link for series flash.Use Google in hacking

Part 2. Use Google tricks for fun

We can use google for fun too. Let’s learn some interesting things.

1. Do A Barrel Roll

Go to google.com. Type ‘Do a barrel roll’ and hit enter. Watch your screen go tumble down.Google dorking

2. Askew

Yet another one of the cool Google tricks for you to try, typing ‘askew’ in your Google search bar. It will kind of tilt on its own.

3. Blink HTML
Go to google and search Blink HTML. You can see all the words blinking at a time. Try this!

4. Play Pacman

Pacman is a game everyone loves, right? Here’s how to play it on your browser. On the Google type ‘Pacman’ and hit enter. Click on ‘Click here to play’ and you are done! Tadaa! One of the cool Google tricks that we absolutely love, this one is super fun too!Google tricks

5. Flip A Coin

For all the times that you do not have a coin and you need to flip one, use this trick. Go to the google, type ‘Flip a coin’ and press enter. What better way to toss a coin? Fancy some more Google tricks games to have up your sleeve?

6. Roll the dice

Just search Roll the dice on google. Now you can roll the dice .google secret

Read our previous article on Udemy courses for free 

Part 3. Use of Google secrets in hacking

Let’s learn some secret use of google in hacking. We can use google for finding confidential things too. Many people use google in their hacking or cracking process. These strings might look confusing and complicated but don’t worry you just have to copy, paste and search the highlighted string only on google search box for obtaining the results. Then click on obtained results and visit the links for gaining information. So, Let’s learn how to use google for hacking.

what is google dork?

A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. In other words, we can use Google dork to find vulnerabilities, hidden information and access pages on certain websites.

Google Dorking or “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites.

  1. Use for Searching of personal data and confidential documents

We can use these dorks for obtaining various personal and confidential data from google. Just search the hightlited text on google. Click on the results links to obtain the information.

  • Just Search filetype:xls inurl:”email.xls” on google. This shows many email.xls files, potentially containing contact information.Google dorks
  • Search “not for distribution” on google. This shows results with confidential documents containing the confidential clause.
  • Search buddylist.blt on google. This shows many AIM contacts list.
  • Search intitle:index.of mystuff.xml . This shows results with IM contacts list.Google dorking
  • Search filetype:ctt “msn” . This shows MSN contacts list.
  • Search filetype:QDF . This shows QDF database files for the Quicken financial application.
  • Search intitle:index.of finances.xls finances.xls . This shows results with files, potentially containing information on bank accounts, financial summaries and credit card numbers.
  • Search intitle:”Index Of” -inurl:maillog  maillog size. This shows maillog files, potentially containing e-mail
  • Search “Network Vulnerability Assessment Report”
    “Host Vulnerability Summary Report”
    filetype:pdf “Assessment Report”
    “This file was generated by Nessus”
    This shows results with reports for network security scans, penetration tests, etc.

2. Use for locating various Web servers

We can use these google dorks for locating various unknown web servers. Just copy and paste the highlited text in google search bar.

  • Search “Apache/1.3.28 Server at” intitle:index.of for Apache 1.3.28Use google dorks in hacking
  • “Apache/2.0 Server at” intitle:index.of for Apache 2.0
  • “Apache/* Server at” intitle:index.of for any version of Apache
  • “Microsoft-IIS/4.0 Server at” intitle:index.of for Microsoft Internet Information Services 4.0
  • “Microsoft-IIS/5.0 Server at” intitle:index.of for Microsoft Internet Information Services 5.0
  • “Microsoft-IIS/6.0 Server at” intitle:index.of for Microsoft Internet Information Services 6.0
  • “Microsoft-IIS/* Server at” intitle:index.of for any version of Microsoft Internet Information Services
  • “Oracle HTTP Server/* Server at” intitle:index.of for any version of Oracle HTTP Server
  • “IBM _ HTTP _ Server/* * Server at” intitle:index.of for any version of IBM HTTP Server
  • “Netscape/* Server at” intitle:index.of for any version of Netscape Server
  • “Red Hat Secure/*” intitle:index.of for any version of the Red Hat Secure server
  • “HP Apache-based Web Server/*” intitle:index.of for any version of the HP server

3. Use of Queries for discovering standard post-installation Web server pages

Just search highlighted strings for getting results about post-installation web server pages.

  • Search intitle:”Test Page for Apache Installation” “You are free” on google for finding Apache 1.2.6 server.Google dorks
  • intitle:”Test Page for Apache Installation” “It worked!” “this Web site!” for Apache 1.3.0 – 1.3.9
  • intitle:”Test Page for Apache Installation” “Seeing this instead” for Apache 1.3.11 – 1.3.33, 2.0
  • intitle:”Test Page for the SSL/TLS-aware Apache Installation” “Hey, it worked!” for Apache SSL/TLS
  • intitle:”Test Page for the Apache Web Server on Red Hat Linux” for Apache on Red Hat
  • intitle:”Test Page for the Apache Http Server on Fedora Core” for Apache on Fedora
  • intitle:”Welcome to Your New Home Page!” for Debian Apache on Debian
  • intitle:”Welcome to IIS 4.0!” for IIS 4.0
  • intitle:”Welcome to Windows 2000 Internet Services” for IIS 5.0
  • intitle:”Welcome to Windows XP Server Internet Services” for IIS 6.0

4. Use of Google queries for locating passwords

We can use google to search for password stored for various website. Just search highlighted text on google. Let’s Learn how you can get such random passwords.

  • Just Search intitle:”Index of” pwd.db pwd.db on google. This shows results with files, potentially containing user names and encrypted passwords.Google dorks
  • Search inurl:admin inurl:backup intitle:index.of . This shows directories whose names contain the words admin and backup.
  • Search ext:pwd inurl:(service|authors|administrators|users) “# -FrontPage-“
    This shows files containing Microsoft FrontPage passwords.
  • Search filetype:sql (“passwd values ****” |”password values ****” | “pass values ****”) . This shows results containing SQL code and passwords inserted into a database.
  • Search intitle:index.of trillian.ini . This shows results with configuration files for the Trillian IM.
  • Search eggdrop filetype:user user on google. You will get results with configuration files for the Eggdrop ircbot.
  • Search filetype:conf slapd.conf . This shows configuration files for OpenLDAP
  • Search inurl:”wvdial.conf” intext:”password”. This shows configuration files for WV Dial.
  • Search ext:ini eudora.ini . This shows configuration files for the Eudora mail client.
  • Search filetype:mdb inurl:users.mdb . This shows Microsoft Access files, potentially containing user account information.
  • Search intext:”powered by Web Wiz Journal” . This shows websites using Web Wiz Journal, which in its standard configuration allows access to the passwords file – just enter http://<host>/journal/journal.mdb instead of the default http://<host>/
    journal/
  • Search “Powered by DUclassified” -site:duware.com
    “Powered by DUcalendar” -site:duware.com
    “Powered by DUdirectory” -site:duware.com
    “Powered by DUclassmate” -site:duware.com
    “Powered by DUdownload” -site:duware.com
    “Powered by DUpaypal” -site:duware.com
    “Powered by DUforum” -site:duware.com intitle:dupics inurl:(add.asp | default.asp |
    view.asp | voting.asp) -site:duware.com
    This shows websites using the DUclassified, DUcalendar, DUdirectory, DU-
    classmate, DUdownload, DUpaypal, DUforum or DUpics applica-
    tions, which by default make it possible to obtain the passwords
    file – for DUclassified, just enter http://<host>/duClassified/ _
    private/duclassified.mdb instead of http://<host>/duClassified/
  • Search intext:”BiTBOARD v2.0″ “BiTSHiFTERS Bulletin
    Board”
    This shows websites using the Bitboard2 bulletin board application, which on
    default settings allows the passwords file to be obtained – enter
    http://<host>/forum/admin/data _ passwd.dat instead of the default
    http://<host>/forum/forum.php

5. Use of Queries for locating network device like cctv, Printers

We can use google for locating network devices like printers, webcams, etc. We can get open access to such devices and see whats going on in them. It’s like printer or CCTV hacks.

  • Search inurl:”printer/main.html” intext:”settings” on google. This shows many  Brother HL printers.Google dorking
  • Search intitle:”Dell Laser Printer” on google. This shows many EWS Dell printers with EWS technology.
  • Search intext:centreware inurl:status on google. This shows Xerox Phaser 4500/6250/8200/8400 printers.
  • Search inurl:hp/device/this.LCDispatcher on google. This shows HP printers.
  • Search intitle:liveapplet inurl:LvAppl on google. This shows Canon Webview webcams.
  • Search intitle:”EvoCam” inurl:”webcam.html” on google. This shows live Evocam webcams of various locations.
  • Search inurl:”ViewerFrame?Mode=” on google. This shows Panasonic Network Camera webcams.
  • Search (intext:”MOBOTIX M1″ | intext:”MOBOTIX M10″) intext:”Open
    Menu” Shift-Reload on google.This shows Mobotix webcams.
  • Search inurl:indexFrame.shtml. This shows Axis Axis webcams, SNC-RZ30 HOME, Sony SNC-RZ30 webcams.
  • Search intitle:”my webcamXP server!” inurl:”:8080″ . This shows webcams accessible via WebcamXP Server
  • Search allintitle:Brains, Corp. camera . This shows webcams accessible via mmEye
  • Search intitle:”active webcam page” . This shows USB webcams.

6. Use of google for database error hacks

  • Search “A syntax error has occurred” filetype:ihtml on google. It shows many vulnerable websites with this error. It is Informix database errors which potentially contains function names, filenames, file structure information, pieces of SQL code and passwords.Google dorking
  • Search “Access denied for user” “Using password” on google. This shows many vulnerable websites. This is Authorization errors  potentially contains user names, function names, file structure information and pieces of SQL code.
  • Search “The script whose uid is ” “is not allowed to access “. This shows results with access-related PHP errors, potentially containing filenames, function names and file structure information.
  • Search “ORA-00921: unexpected end of SQL command” . This shows results with Oracle database errors, potentially containing filenames, function names and file structure information.
  • search “error found handling the request” cocoon filetype:xml
    This shows Cocoon errors, potentially containing Cocoon version information, filenames,
    function names and file structure information.
  • Search “Invision Power Board Database Error”
    This shows Invision Power Board bulletin board errors, potentially containing function
    names, filenames, file structure information and piece of SQL code.
  • Search “Warning: mysql _ query()”
    “invalid query”
    This shows MySQL database errors, potentially containing user names, function names,
    filenames and file structure information.
  • Search “Error Message : Error loading required libraries.”
    This shows CGI script errors, potentially containing information about operating system
    and program versions, user names, filenames and file structure information.
  • Search “#mysql dump” filetype:sql . This shows MySQL database errors, potentially containing information about database structure and contents.

That’s it for today guys. I think the article was too much long and sorry due to that i couldn’t include much stuff but i had included all the vital informations. If you want such awesome tips and tricks then feel free to subscribe to our newsletter and allow notification for our website in browser. Comment your thoughts below. Feel free to share and support us. Byee till next article.

Tweet Pin It submit
Prev Article
Next Article

Related Articles

Live TV for free
Life would so much better if we can get live …

How to get live tv for free with live sport | TVnow premium(100% working)| Toptechpal

Best free photo editor online
Five best free photo editor online tools As a business …

Best photo editors for small business to boost speed

image to text tools
Best images to text tools Have you ever done a …

3 best images to text tools to extract text from the image

How to become an influencer
How to Become an Influencer (Full-Time) Influencers are the leading …

How to Become an Influencer (Full-Time) 100% – Toptechpal

About The Author

Roshan

Roshan kc is a cybersecurity journalist with a passion for covering latest happenings in cyber security and tech world. In addition to being the founder of this website, Roshan is also into gaming, reading and investigative journalism and additional to them he is also interested in movies, anime and web series.

5 Comments

  1. Ghulam

    It helped a lot, I wish it’d be more detailed. Btw, is there any telegram group of your website.

    February 5, 2020
    • Roshan

      Thank you for your feedback. We will consider your suggestion. We have telegram group named as thetechrim

      February 5, 2020
  2. Pingback: Solve Bluetooth Earbuds Problem On Any Android Device (100% Working Method) - TopTechpal
    February 5, 2020
  3. Lost Guy

    Very good article. Please shared dork to find alumni information for specific institution.

    March 6, 2020
  4. Slot Online

    My partner and I absolutely love your blog and find a lot of your post’s to be what precisely I’m looking for.
    Do you offer guest writers to write content for you?
    I wouldn’t mind creating a post or elaborating on a lot of
    the subjects you write related to here. Again, awesome web
    log!

    May 15, 2020
    • Roshan

      Yes give us your articles and we analyze it and post it by providing you proper credit

      May 28, 2020
  5. Pingback: Everything about discord text formatting| Premium guide-100%
    August 7, 2020

Leave a Reply

Cancel reply

Ads

Related Posts

  • Create free edu email address
    How to create free edu email (100% …
    April 18, 2022 4
  • steganography decoder tools - how to hide message in image
    Steganography decoder tools | How to hide …
    May 9, 2020 0
  • Free VyprVPN trial unlimited
    How to get free vyprvpn trial unlimited …
    December 16, 2020 0
  • Google cloud free
    How to get google cloud free | …
    May 19, 2020 5
  • how to find best kik groups
    How to find Best Kik Groups Chat …
    August 29, 2022 0

TopTechpal

World of Tech

About US

TopTechpal is the best website to get information about technology, hacks and hacking news, gadget and Technical solutions. We provide authentic information about latest gadgets and post leaks. We provide authentic information and occasionally some free stuff to our viewers.

Contact us: admin@toptechpal.com

Check

  • About us
  • Terms and Conditions
  • Privacy Policy
  • Cookies Policy
  • Disclaimer
  • Advertisement
  • Contact Us
Copyright © 2023 TopTechpal
Website by @ Top Techpal

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of All the cookies.Read More
Cookie settingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT