Today we will learn about Google’s secret which we can use for hacking and gaining information and also for fun. Don’t lose hope or get bored by seeing so much information. I can guarantee that this information is explained in the easiest way ever on the Internet. We will discuss many Google secrets, hacks, and tricks that we can use to gain everything that exists on Google like movies, leaks, TV shows, Courses, etc., and also for hacking purposes. Let’s learn everything about Google Secret and learn to use it effectively like a pro.
Note: things you learn here are only for education purpose. You are responsible for everything you perform and we will not be held responsible.
So let’s learn everything about Google and how to use it like a hacker.
Part 1. Google Secret words to use for effective search results
1. Use of “Site” while searching restricts results to the specified domain
For example: “site:toptechpal.com Netflix” will find all results in that specific site containing the word Netflix. It can be used to find results within a specific site.
2. Use of “intitle” restricts results to documents whose title contains the specified phrase
For example:” intitle:Netflix hack” will find all sites with the word Netflix in the
title and hack in the text.
3. Use of “allintitle” restricts results to documents whose title contains all the specified phrases
For example: “allintitle:Netflix hack” will find all sites with the word Netflix and hack in the title, so it’s the same as using
4. Use of “filetype: extension filename” restricts results to documents of the
For example: filetype: mp4 Joker will show videos containing the word joker, while filetype: pdf SAT Course will show PDF files with the word SAT Course.
5. Use of “allintext” restricts results to documents containing the specified phrase in the text
For example: allintext:”Netflix hack” will shows results that contain the phrase Netflix hack in their text only
6. Use of “inurl: xyz.com intext: we want to search” will restrict search results within URL with that specific text
For example: inurl: toptechpal.com intext: pubg hack file, this will show pubg hack file word in text containing in toptechpal.com in URL. Also inurl: mediafire.com intext: Spotify mod apk shows Spotify mod apk uploaded on mediafire.
7. Use of “+” specifies that the phrase should occur frequently in results.
For example: +Netflix will shows results by higher number of occurrences of netflix in post or documents.
8. Use of “” delimiters for entire search phrase.
For example:”SAT courses” shows documents or results which contain only netflix hacking techniques.
Find any movies and shows that exist on google
Search in this format
Movie name google docs
For example: Pirate of Caribbean google docs
[Movie Name] -inurl:(htm|html|php|pls|txt)intitle:index.of “last modified” (mkv|mp4|avi)
This will shows many results of with Download link of movies only. Just follow the links with “index of movie name” and download your file
[fast and furious] -inurl:(htm|html|php|pls|txt)intitle:index.of “last modified” (mkv|mp4|avi)
“index of movie or shows name” also work most of time.
For example: Index of flash, this shows file with download link for series flash.
Part 2. Use Google Tricks for fun
We can use Google for fun too. Let’s learn some interesting things.
1. Do A Barrel Roll
Go to google.com. Type ‘Do a barrel roll’ and hit enter. Watch your screen tumble down.
Yet another one of the cool Google tricks for you to try, typing ‘askew’ in your Google search bar. It will kind of tilt on its own.
3. Blink HTML
Go to google and search Blink HTML. You can see all the words blinking at a time. Try this!
4. Play Pacman
Pacman is a game everyone loves, right? Here’s how to play it on your browser. On the Google type ‘Pacman’ and hit enter. Click on ‘Click here to play’ and you are done! Tadaa! One of the cool Google tricks that we absolutely love, this one is super fun too!
5. Flip A Coin
For all the times that you do not have a coin and you need to flip one, use this trick. Go to the google, type ‘Flip a coin’ and press enter. What better way to toss a coin? Fancy some more Google tricks games to have up your sleeve?
6. Roll the dice
Just search Roll the dice on google. Now you can roll the dice .
Part 3. Use of Google secrets in hacking
Let’s learn some secret use of Google in hacking. We can use Google to find confidential things too. Many people use Google in their hacking or cracking process. These strings might look confusing and complicated but don’t worry you just have to copy, paste, and search the highlighted string only on the Google search box to obtain the results. Then click on the obtained results and visit the links to gain information. So, Let’s learn how to use Google for hacking.
What is google dork?
A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. In other words, we can use Google Dork to find vulnerabilities and hidden information, and access pages on certain websites.
Google Dorking or “Google Hacking” mainly refers to pulling sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type, and some interesting information from unsecured Websites.
Use for Searching for personal data and confidential documents
We can use these dorks to obtain various personal and confidential data from Google. Just search the highlighted text on Google. Click on the results links to obtain the information.
- Just Search filetype:xls inurl:”email.xls” on Google. This shows many email.xls files, potentially containing contact information.
- Search “not for distribution” on Google. This shows results with confidential documents containing the confidential clause.
- Search buddylist.blt on Google. This shows many AIM contact lists.
- Search intitle:index.of mystuff.xml . This shows results with the IM contacts list.
- Search filetype:ctt “msn”. This shows the MSN contacts list.
- Search filetype:QDF . This shows QDF database files for the Quicken financial application.
- Search intitle:index.of finances.xls finances.xls . This shows results with files, potentially containing information on bank accounts, financial summaries, and credit card numbers.
- Search intitle:”Index Of” -inurl:maillog maillog size. This shows mail log files, potentially containing e-mail
- Search “Network Vulnerability Assessment Report”
“Host Vulnerability Summary Report”
filetype:pdf “Assessment Report”
“This file was generated by Nessus”
This shows results with reports for network security scans, penetration tests, etc.
2. Use for locating various Web servers
We can use these Google dorks to locate various unknown web servers. Just copy and paste the highlighted text into Google search bar.
- Search “Apache/1.3.28 Server at” intitle:index.of for Apache 1.3.28
- “Apache/2.0 Server at” intitle:index.of for Apache 2.0
- “Apache/* Server at” intitle:index.of for any version of Apache
- “Microsoft-IIS/4.0 Server at” intitle:index.of for Microsoft Internet Information Services 4.0
- “Microsoft-IIS/5.0 Server at” intitle:index.of for Microsoft Internet Information Services 5.0
- “Microsoft-IIS/6.0 Server at” intitle:index.of for Microsoft Internet Information Services 6.0
- “Microsoft-IIS/* Server at” intitle:index.of for any version of Microsoft Internet Information Services
- “Oracle HTTP Server/* Server at” intitle:index.of for any version of Oracle HTTP Server
- “IBM _ HTTP _ Server/* * Server at” intitle:index.of for any version of IBM HTTP Server
- “Netscape/* Server at” intitle:index.of for any version of Netscape Server
- “Red Hat Secure/*” intitle:index.of for any version of the Red Hat Secure server
- “HP Apache-based Web Server/*” intitle:index.of for any version of the HP server
3. Use of Queries for discovering standard post-installation Web server pages
Just search highlighted strings to get results about post-installation web server pages.
- Search intitle:”Test Page for Apache Installation” “You are free” on Google for finding Apache 1.2.6 server.
- intitle:”Test Page for Apache Installation” “It worked!” “this Web site!” for Apache 1.3.0 – 1.3.9
- intitle:”Test Page for Apache Installation” “Seeing this instead” for Apache 1.3.11 – 1.3.33, 2.0
- intitle:”Test Page for the SSL/TLS-aware Apache Installation” “Hey, it worked!” for Apache SSL/TLS
- intitle:”Test Page for the Apache Web Server on Red Hat Linux” for Apache on Red Hat
- intitle:”Test Page for the Apache HTTP Server on Fedora Core” for Apache on Fedora
- intitle:”Welcome to Your New Home Page!” for Debian Apache on Debian
- intitle:”Welcome to IIS 4.0!” for IIS 4.0
- intitle:”Welcome to Windows 2000 Internet Services” for IIS 5.0
- intitle:”Welcome to Windows XP Server Internet Services” for IIS 6.0
4. Use of Google queries for locating passwords
We can use Google to search for passwords stored for various websites. Just search highlighted text on Google. Let’s Learn how you can get such random passwords.
- Just Search intitle:”Index of” pwd.db pwd.db on Google. This shows results with files, potentially containing user names and encrypted passwords.
- Search inurl:admin inurl:backup intitle:index.of . This shows directories whose names contain the words admin and backup.
- Search ext:pwd inurl:(service|authors|administrators|users) “# -FrontPage-“
This shows files containing Microsoft FrontPage passwords.
- Search filetype:sql (“passwd values ****” |”password values ****” | “pass values ****”) . This shows results containing SQL code and passwords inserted into a database.
- Search intitle:index.of trillian.ini . This shows results with configuration files for the Trillian IM.
- Search eggdrop filetype:user user on google. You will get results with configuration files for the Eggdrop ircbot.
- Search filetype:conf slapd.conf . This shows configuration files for OpenLDAP
- Search inurl:”wvdial.conf” intext:”password”. This shows configuration files for WV Dial.
- Search ext:ini eudora.ini . This shows configuration files for the Eudora mail client.
- Search filetype:mdb inurl:users.mdb . This shows Microsoft Access files, potentially containing user account information.
- Search intext:”powered by Web Wiz Journal” . This shows websites using Web Wiz Journal, which in its standard configuration allows access to the passwords file – just enter http://<host>/journal/journal.mdb instead of the default http://<host>/
- Search “Powered by DUclassified” -site:duware.com
“Powered by DUcalendar” -site:duware.com
“Powered by DUdirectory” -site:duware.com
“Powered by DUclassmate” -site:duware.com
“Powered by DUdownload” -site:duware.com
“Powered by DUpaypal” -site:duware.com
“Powered by DUforum” -site:duware.com intitle:dupics inurl:(add.asp | default.asp |
view.asp | voting.asp) -site:duware.com
This shows websites using the DUclassified, DUcalendar, DUdirectory, DU-
classmate, DUdownload, DUpaypal, DUforum or DUpics applica-
tions, which by default make it possible to obtain the passwords
file – for DUclassified, just enter http://<host>/duClassified/ _
private/duclassified.mdb instead of http://<host>/duClassified/
- Search intext:”BiTBOARD v2.0″ “BiTSHiFTERS Bulletin
This shows websites using the Bitboard2 bulletin board application, which on
default settings allows the passwords file to be obtained – enter
http://<host>/forum/admin/data _ passwd.dat instead of the default
5. Use of Queries for locating network devices like CCTV, Printers
We can use Google for locating network devices like printers, webcams, etc. We can get open access to such devices and see what’s going on in them. It’s like a printer or CCTV hack.
- Search inurl:”printer/main.html” intext:”settings” on Google. This shows many Brother HL printers.
- Search intitle:”Dell Laser Printer” on google. This shows many EWS Dell printers with EWS technology.
- Search intext:centreware inurl:status on google. This shows Xerox Phaser 4500/6250/8200/8400 printers.
- Search inurl:hp/device/this.LCDispatcher on google. This shows HP printers.
- Search intitle:liveapplet inurl:LvAppl on google. This shows Canon Webview webcams.
- Search intitle:”EvoCam” inurl:”webcam.html” on google. This shows live Evocam webcams of various locations.
- Search inurl:”ViewerFrame?Mode=” on google. This shows Panasonic Network Camera webcams.
- Search (intext:”MOBOTIX M1″ | intext:”MOBOTIX M10″) intext:”Open
Menu” Shift-Reload on google.This shows Mobotix webcams.
- Search inurl:indexFrame.shtml. This shows Axis Axis webcams, SNC-RZ30 HOME, Sony SNC-RZ30 webcams.
- Search intitle:”my webcamXP server!” inurl:”:8080″. This shows webcams accessible via the WebcamXP Server
- Search allintitle:Brains, Corp. camera . This shows webcams accessible via mmEye
- Search intitle:”active webcam page”. This shows USB webcams.
6. Use of Google for database error hacks
- Search “A syntax error has occurred” filetype:ihtml on Google. It shows many vulnerable websites with this error. It is Informix database errors that potentially contain function names, filenames, file structure information, pieces of SQL code, and passwords.
- Search “Access denied for user” and “Using password” on Google. This shows many vulnerable websites. These authorization errors potentially contain user names, function names, file structure information, and pieces of SQL code.
- Search “The script whose uid is ” “is not allowed to access “. This shows results with access-related PHP errors, potentially containing filenames, function names, and file structure information.
- Search “ORA-00921: unexpected end of SQL command”. This shows results with Oracle database errors, potentially containing filenames, function names, and file structure information.
- Search “error found handling the request” cocoon filetype:xml
This shows Cocoon errors, potentially containing Cocoon version information, filenames,
function names and file structure information.
- Search “Invision Power Board Database Error”
This shows Invision Power Board bulletin board errors, potentially containing function
names, filenames, file structure information, and pieces of SQL code.
- Search “Warning: mysql _ query()”
This shows MySQL database errors, potentially containing user names, function names,
filenames and file structure information.
- Search “Error Message: Error loading required libraries.”
This shows CGI script errors, potentially containing information about the operating system
and program versions, user names, filenames, and file structure information.
- Search “#mysql dump” filetype:sql. This shows MySQL database errors, potentially containing information about database structure and contents.
That’s it for today guys. I think the article was too long and sorry that I couldn’t include much stuff but I had included all the vital information. If you want such awesome tips and tricks then feel free to subscribe to our newsletter and allow notification for our website in browser. Comment your thoughts below. Feel free to share and support us. Bye till the next article.