In 2002, Johnny Long began collecting Google search queries that uncovered vulnerable systems or sensitive information disclosures. He labeled them Google Dorks. Since the article is about legally obtained information I’m not going to show how to get unauthorized access, however, you can explore Google Hacking Database with thousands of different queries. The exxample queries below can return information that is difficult to locate through a simple search.
“john doe” site:instagram.com — quotation marks force Google Search to do absolutely exact match while the search is performed on Instagram.
“john doe” -“site:instagram.com/johndoe” site:instagram.com — hide postings from the target’s own account, but show posted comments on the Instagram posts of others.
“john” “doe” -site:instagram.com — show results that exactly match the given name and surname but in different combinations. Also, exclude Instagram from results.
“CV” OR “Curriculum Vitae” filetype:PDF “john” “doe” — search for the target’s resumes that contain “CV” or “Curriculum Vitae” in the name and have a PDF extension.
How to get your free month
How pricing works
How to view posts
What you can post
A #podcast about #persuasion, #deception, #communication, and the #Grayman
https://promocards.byspotify.com/share/5e3dfefd944d823be992a43447470e279711b635
These are some of my favorite camping tips A #podcast about #preparedness, #camping, #hiking, and the #Grayman
https://spotifyanchor-web.app.link/e/umedj5kJiBb