Dorking —

Not all information extraction techniques require sophisticated tools. Sometimes, regular search engines can provide cybersecurity specialists with enough data to conduct penetration testing or find crucial—perhaps even sensitive—information inadvertently published by its owner. 

Most people use natural, straightforward language and phrases to enter Google queries. However, those who have more technically demanding goals in their sights can use advanced search engine operators and methods to conduct precise searches, which would not be possible via regular requests. This technique is known as Google Dorking.

It's important to note that dorking can only return publicly available information and does not involve any hacking or illegal activities. Nonetheless, the use of dorking has raised concerns about privacy and security, and some organizations have implemented measures to prevent or limit the use of these techniques.

Our OSINT Solutions

sl
crimewall

BETA
A FULL-CYCLE
OSINT INVESTIGATION
platform
sl api icon

sl
api

API

A suite of data extraction and analysis methods across social media, blockchains, messengers, and the Dark Web connected directly to your in-house platform via our API.

sl professional icon

SL PROFESSIONAL

MALTEGO AND i2

A versatile OSINT tool for conducting in-depth investigations across social media, blockchains, messengers, and the Dark Web via the Maltego and i2 platforms.

sl private platform icon

SL PRIVATE PLATFORM

ON-PREMISE

An enterprise-grade on-premise OSINT platform with customization options, private data storage, and our widest range of search methods.