Find Dumped Password using Google Dork

February 3, 2018 | Views: 15788

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

In this post, I introduce some sensitive information- passwords usingGooglee dorks. This technique would help you in various phases of your penetration test.

1.ext:sql intext:username intext:password

This piece of query retrieve the clear text password of database files.


mysql> SELECT * FROM userss;
| userid | username          | password   |
|      1 | Barack Obama      | Top*Secret | 
|      2 | Angela Merkel     | D-Mark     | 
|      3 | Lula da Silva     | sAmBa      | 
|      4 | Fidel Castro      | el Che     | 
|      5 | Silvio Berlusconi | ruby       | 
5 rows in set (0.00 sec)
So this is an example result of just cross your fingers for more
 sensitive information.
2.filetype:txt username password email
  This will retry txt files containing username, password, and email information.
ontrol Panel:
       Username:               foclient
       Password:               Z9KF7c7BZgct
       1st Nameserver:
       2nd Nameserver:
       Server IP:    
 Customize dorks yourself for more interesting sensitive information. 
                                   Thanks happy hunting...


Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. thanks for sharing..

  2. Wow it’s impressive can u tell me it’s work on turmux in android

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?