{"id":880,"date":"2020-05-09T04:08:47","date_gmt":"2020-05-09T03:08:47","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=880"},"modified":"2020-09-28T18:07:40","modified_gmt":"2020-09-28T17:07:40","slug":"google-dorks-hackings-new-door","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/google-dorks-hackings-new-door\/","title":{"rendered":"Google Dorks &#8211; Hacking\u2019s New Door"},"content":{"rendered":"<p id=\"246c\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">Summary :<\/strong><\/p>\n<p id=\"47ce\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">The \u201cGoogle Dorks\u201d is a technique that uses google searches to find security holes and sensitive information that is not readily available on a website. It is one of the most effective technique to find sensitive information of any website. It is also know as passive information gathering technique.<\/p>\n<p id=\"2467\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\"><em class=\"gm\">Google Dorks<\/em><\/strong>\u00a0gives you the information which is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected.<\/p>\n<p id=\"1d35\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\"><em class=\"gm\">Google Dorks<\/em><\/strong>\u00a0can return usernames and passwords, email lists, sensitive documents, API keys, personally identifiable information, website vulnerabilities etc. That information can be used for any number of illegal activities like cyber terrorism, identity theft, cyber stalking etc.<\/p>\n<p id=\"e7b1\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">Basics :<\/strong><\/p>\n<p id=\"56a6\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\"><em class=\"gm\">Google Dorks\u00a0<\/em><\/strong>uses advanced operators in the Google search engine to locate specific strings of text within search results. Some of the popular examples for finding websites that are vulnerable to SQL injection, XSS, API keys etc. are<\/p>\n<ol class=\"\">\n<li id=\"355d\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge gn go gp\" data-selectable-paragraph=\"\">Dork for SQL Injection\u00a0<strong class=\"ft gl\">&#8211;<\/strong>\u00a0<strong class=\"ft gl\">inurl: .php?id=<\/strong><\/li>\n<\/ol>\n<figure class=\"gr gs gt gu gv gw co cp paragraph-image\">\n<div class=\"gx gy gz ha ai\">\n<div class=\"co cp gq\">\n<div class=\"hg r gz hh\">\n<div class=\"hi hj r\">\n<div class=\"hb hc s t u hd ai av he hf\"><img loading=\"lazy\" decoding=\"async\" class=\"s t u hd ai hk hl bc rl\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/60\/1*T3eHNO6dLueZQyA7SexaFA.png?q=20\" width=\"1190\" height=\"373\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"mi rk s t u hd ai hn\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/1190\/1*T3eHNO6dLueZQyA7SexaFA.png\" sizes=\"auto, 700px\" srcset=\"https:\/\/miro.medium.com\/max\/552\/1*T3eHNO6dLueZQyA7SexaFA.png 276w, https:\/\/miro.medium.com\/max\/1104\/1*T3eHNO6dLueZQyA7SexaFA.png 552w, https:\/\/miro.medium.com\/max\/1280\/1*T3eHNO6dLueZQyA7SexaFA.png 640w, https:\/\/miro.medium.com\/max\/1400\/1*T3eHNO6dLueZQyA7SexaFA.png 700w\" width=\"1190\" height=\"373\" \/><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><figcaption class=\"ho hp cq co cp hq hr cd eh ei cf ci\" data-selectable-paragraph=\"\">SQL Injection<\/figcaption><\/figure>\n<p id=\"51b1\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">2. Dork for XSS\u00a0<strong class=\"ft gl\">&#8211;<\/strong>\u00a0<strong class=\"ft gl\">inurl:\u201d.php?searchst\u00adring=\u201d<\/strong><\/p>\n<figure class=\"gr gs gt gu gv gw co cp paragraph-image\">\n<div class=\"gx gy gz ha ai\">\n<div class=\"co cp hs\">\n<div class=\"hg r gz hh\">\n<div class=\"ht hj r\">\n<div class=\"hb hc s t u hd ai av he hf\"><img loading=\"lazy\" decoding=\"async\" class=\"s t u hd ai hk hl bc rl\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/60\/1*FFXBIkBgfh3DMsNqpxU_dw.png?q=20\" width=\"1067\" height=\"375\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"mi rk s t u hd ai hn\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/1067\/1*FFXBIkBgfh3DMsNqpxU_dw.png\" sizes=\"auto, 700px\" srcset=\"https:\/\/miro.medium.com\/max\/552\/1*FFXBIkBgfh3DMsNqpxU_dw.png 276w, https:\/\/miro.medium.com\/max\/1104\/1*FFXBIkBgfh3DMsNqpxU_dw.png 552w, https:\/\/miro.medium.com\/max\/1280\/1*FFXBIkBgfh3DMsNqpxU_dw.png 640w, https:\/\/miro.medium.com\/max\/1400\/1*FFXBIkBgfh3DMsNqpxU_dw.png 700w\" width=\"1067\" height=\"375\" \/><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><figcaption class=\"ho hp cq co cp hq hr cd eh ei cf ci\" data-selectable-paragraph=\"\">XSS<\/figcaption><\/figure>\n<p id=\"0bcc\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">3. Dork for API keys\u00a0<strong class=\"ft gl\">&#8211; intitle:\u201dindex of\u201d api_key OR \u201capi key\u201d OR apiKey<\/strong><\/p>\n<figure class=\"gr gs gt gu gv gw co cp paragraph-image\">\n<div class=\"co cp hu\">\n<div class=\"hg r gz hh\">\n<div class=\"hv hj r\">\n<div class=\"hb hc s t u hd ai av he hf\"><img loading=\"lazy\" decoding=\"async\" class=\"s t u hd ai hk hl bc rl\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/60\/1*dvHJxAqMeERc7FBoPOqUNQ.png?q=20\" width=\"665\" height=\"329\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"mi rk s t u hd ai hn\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/665\/1*dvHJxAqMeERc7FBoPOqUNQ.png\" sizes=\"auto, 665px\" srcset=\"https:\/\/miro.medium.com\/max\/552\/1*dvHJxAqMeERc7FBoPOqUNQ.png 276w, https:\/\/miro.medium.com\/max\/1104\/1*dvHJxAqMeERc7FBoPOqUNQ.png 552w, https:\/\/miro.medium.com\/max\/1280\/1*dvHJxAqMeERc7FBoPOqUNQ.png 640w, https:\/\/miro.medium.com\/max\/1330\/1*dvHJxAqMeERc7FBoPOqUNQ.png 665w\" width=\"665\" height=\"329\" \/><\/p>\n<\/div>\n<\/div>\n<\/div><figcaption class=\"ho hp cq co cp hq hr cd eh ei cf ci\" data-selectable-paragraph=\"\">API Key<\/figcaption><\/figure>\n<p id=\"2e71\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">Above are the most common examples of finding some common vulnerabilities on the websites, but this aren\u2019t the limited one.<\/p>\n<p id=\"c01e\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">NOTE : You can check here for more dorks :\u00a0<a class=\"bx ff hw hx hy hz\" href=\"https:\/\/www.exploit-db.com\/google-hacking-database\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><strong class=\"ft gl\">https:\/\/www.exploit-db.com\/google-hacking-database<\/strong><\/a><\/p>\n<p id=\"a451\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">This was the basics to find the information or vulnerabilities using\u00a0<strong class=\"ft gl\"><em class=\"gm\">Google Dorks,\u00a0<\/em><\/strong>now lets look at some of the advance and \u201cnot so popular\u201d techniques of finding sensitive information.<\/p>\n<p id=\"2c15\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">Advance :<\/strong><\/p>\n<p id=\"8718\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">You guys are might be aware about\u00a0<a class=\"bx ff hw hx hy hz\" href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Methods\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><strong class=\"ft gl\">HTTP VERBS<\/strong><\/a><strong class=\"ft gl\">.\u00a0<\/strong>There are many http verbs out of which\u00a0<strong class=\"ft gl\">GET<\/strong>\u00a0&amp;\u00a0<strong class=\"ft gl\">POST<\/strong>\u00a0are the most commonly used. Now we all know that the\u00a0<strong class=\"ft gl\">GET<\/strong>\u00a0method is not suitable for passing sensitive information such as the username and password, because these are fully visible in the URL query string as well as potentially stored in the client browser\u2019s memory as a visited page.<\/p>\n<p id=\"36ba\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">Still there are many websites that are passing sensitive information using<strong class=\"ft gl\">\u00a0GET<\/strong>\u00a0method, to make it secure you can use the blocking rules. Commonly, the blocking rules could be setup easily by write some \u201cDisallow\u201d rules at robots.txt file.<\/p>\n<figure class=\"gr gs gt gu gv gw co cp paragraph-image\">\n<div class=\"gx gy gz ha ai\">\n<div class=\"co cp ia\">\n<div class=\"hg r gz hh\">\n<div class=\"ib hj r\">\n<div class=\"hb hc s t u hd ai av he hf\"><img loading=\"lazy\" decoding=\"async\" class=\"s t u hd ai hk hl bc rl\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/60\/1*N4H6tgf6yhbMnq8vQYMVsg.png?q=20\" width=\"1366\" height=\"768\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"mi rk s t u hd ai hn\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/1366\/1*N4H6tgf6yhbMnq8vQYMVsg.png\" sizes=\"auto, 700px\" srcset=\"https:\/\/miro.medium.com\/max\/552\/1*N4H6tgf6yhbMnq8vQYMVsg.png 276w, https:\/\/miro.medium.com\/max\/1104\/1*N4H6tgf6yhbMnq8vQYMVsg.png 552w, https:\/\/miro.medium.com\/max\/1280\/1*N4H6tgf6yhbMnq8vQYMVsg.png 640w, https:\/\/miro.medium.com\/max\/1400\/1*N4H6tgf6yhbMnq8vQYMVsg.png 700w\" width=\"1366\" height=\"768\" \/><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><figcaption class=\"ho hp cq co cp hq hr cd eh ei cf ci\" data-selectable-paragraph=\"\">Blocking Rules<\/figcaption><\/figure>\n<p id=\"b30c\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">While hunting on a private program I found a request where they were using\u00a0<strong class=\"ft gl\">GET\u00a0<\/strong>parameter which contained email, some key, ID, my country name etc. So I tried finding email\u2019s of other users on the same site and I got some yahoo email ID\u2019s<\/p>\n<ol class=\"\">\n<li id=\"bd4b\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge gn go gp\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">Dork Used for yahoo :\u00a0<\/strong>site:target.com inurl:\u2019@yahoo.co\u2019 (which will give me .com and .co.in) emails of yahoo<\/li>\n<\/ol>\n<figure class=\"gr gs gt gu gv gw co cp paragraph-image\">\n<div class=\"co cp ic\">\n<div class=\"hg r gz hh\">\n<div class=\"id hj r\">\n<div class=\"hb hc s t u hd ai av he hf\"><img loading=\"lazy\" decoding=\"async\" class=\"s t u hd ai hk hl bc rl\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/60\/1*CNKXiUYMbJF_JJCUhiWHkg.png?q=20\" width=\"587\" height=\"142\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"mi rk s t u hd ai hn\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/587\/1*CNKXiUYMbJF_JJCUhiWHkg.png\" sizes=\"auto, 587px\" srcset=\"https:\/\/miro.medium.com\/max\/552\/1*CNKXiUYMbJF_JJCUhiWHkg.png 276w, https:\/\/miro.medium.com\/max\/1104\/1*CNKXiUYMbJF_JJCUhiWHkg.png 552w, https:\/\/miro.medium.com\/max\/1174\/1*CNKXiUYMbJF_JJCUhiWHkg.png 587w\" width=\"587\" height=\"142\" \/><\/p>\n<\/div>\n<\/div>\n<\/div><figcaption class=\"ho hp cq co cp hq hr cd eh ei cf ci\" data-selectable-paragraph=\"\">Yahoo<\/figcaption><\/figure>\n<p id=\"2ab4\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">I got an excel sheet containing yahoo emails and phone numbers of the users of that site.<\/p>\n<p id=\"b357\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">Now I wanted to find some more emails so I enumerated further and got emails of outlook.live and gmail.com<\/p>\n<p id=\"c6ef\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">2. Dork Used for outlook<\/strong>\u00a0: site:target.com inurl:\u2019@live.com\u2019<\/p>\n<figure class=\"gr gs gt gu gv gw co cp paragraph-image\">\n<div class=\"co cp ic\">\n<div class=\"hg r gz hh\">\n<div class=\"id hj r\">\n<div class=\"hb hc s t u hd ai av he hf\"><img loading=\"lazy\" decoding=\"async\" class=\"s t u hd ai hk hl bc rl\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/60\/1*GBj4rmxC8Os-zy823aH3fg.png?q=20\" width=\"587\" height=\"142\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"mi rk s t u hd ai hn\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/587\/1*GBj4rmxC8Os-zy823aH3fg.png\" sizes=\"auto, 587px\" srcset=\"https:\/\/miro.medium.com\/max\/552\/1*GBj4rmxC8Os-zy823aH3fg.png 276w, https:\/\/miro.medium.com\/max\/1104\/1*GBj4rmxC8Os-zy823aH3fg.png 552w, https:\/\/miro.medium.com\/max\/1174\/1*GBj4rmxC8Os-zy823aH3fg.png 587w\" width=\"587\" height=\"142\" \/><\/p>\n<\/div>\n<\/div>\n<\/div><figcaption class=\"ho hp cq co cp hq hr cd eh ei cf ci\" data-selectable-paragraph=\"\">Outlook<\/figcaption><\/figure>\n<p id=\"3efc\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">3. Dork Used for gmail :\u00a0<\/strong>site:target.com inurl:\u2019@gmail.com\u2019<\/p>\n<figure class=\"gr gs gt gu gv gw co cp paragraph-image\">\n<div class=\"co cp ic\">\n<div class=\"hg r gz hh\">\n<div class=\"ie hj r\">\n<div class=\"hb hc s t u hd ai av he hf\"><img loading=\"lazy\" decoding=\"async\" class=\"s t u hd ai hk hl bc rl\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/60\/1*sdEkftYY3UmK7xS4vgnNJg.png?q=20\" width=\"587\" height=\"192\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"mi rk s t u hd ai hn\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/max\/587\/1*sdEkftYY3UmK7xS4vgnNJg.png\" sizes=\"auto, 587px\" srcset=\"https:\/\/miro.medium.com\/max\/552\/1*sdEkftYY3UmK7xS4vgnNJg.png 276w, https:\/\/miro.medium.com\/max\/1104\/1*sdEkftYY3UmK7xS4vgnNJg.png 552w, https:\/\/miro.medium.com\/max\/1174\/1*sdEkftYY3UmK7xS4vgnNJg.png 587w\" width=\"587\" height=\"192\" \/><\/p>\n<\/div>\n<\/div>\n<\/div><figcaption class=\"ho hp cq co cp hq hr cd eh ei cf ci\" data-selectable-paragraph=\"\">Gmail<\/figcaption><\/figure>\n<p id=\"9684\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">Some more useful dorks :<\/strong><\/p>\n<ol class=\"\">\n<li id=\"f94e\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge gn go gp\" data-selectable-paragraph=\"\">site:&lt;Website&gt; inurl:&lt;GET Parameter&gt;<\/li>\n<\/ol>\n<p id=\"7019\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><em class=\"gm\">Example<\/em>\u00a0:<\/p>\n<p id=\"5e8f\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">i) site:target.com inurl:api_key<\/p>\n<p id=\"a97a\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">ii) site:target.com inurl:email<\/p>\n<p id=\"0038\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">iii) site:target.com inurl:amount<\/p>\n<p id=\"c935\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">2. intitle:\u201dindex of\u201d \u201c\/etc\/mysql\/\u201d<\/p>\n<p id=\"9f05\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">3. site:\u201dtarget.com\u201d database.yml<\/p>\n<p id=\"3c6d\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">4. inurl:group_concat(username, filetype:php intext:admin<\/p>\n<p id=\"0d0f\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">5. inurl:\/wwwboard\/passwd.txt<\/p>\n<p id=\"5a37\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">6. filetype:reg reg HKEY_CLASSES_ROOT -git<\/p>\n<p id=\"51b2\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">7. inurl:\/database* ext:sql intext:index of -site:target.com<\/p>\n<p id=\"86bc\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">This are some of the not so common but useful\u00a0<strong class=\"ft gl\"><em class=\"gm\">Google Dorks<\/em><\/strong>\u00a0to find sensitive information of the website. You can also modify this dorks and you can also use more dorks with this dorks.<\/p>\n<p id=\"c7c4\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\"><strong class=\"ft gl\">NOTE<\/strong>\u00a0: You can prevent a page from appearing in Google Search by including a \u201cnoindex\u201d meta tag in the page&#8217;s HTML code, or by returning a &#8216;noindex&#8217; header in the HTTP request.<\/p>\n<p id=\"78d0\" class=\"fr gf ap ce ft b fu fv gg fw fx gh fy fz gi ga gb gj gc gd gk ge cx\" data-selectable-paragraph=\"\">Thank You \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary : The \u201cGoogle Dorks\u201d is a technique that uses google searches to find security holes and sensitive information that<\/p>\n","protected":false},"author":1,"featured_media":881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[51],"tags":[],"yst_prominent_words":[1278,1272,1268,1269,1277,1270,561,1271,1266,265,1264,284,1273,261,1274,1267,1275,1265,1276,217],"class_list":["post-880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=880"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/880\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/881"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=880"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}