Monday, December 27, 2021

Kali Linux help for Google Dorking and Python3 & Pip3 with installing the Dorks List & Dorks-eye & Pagodo from Github.com and instructions with how to download & Install a Github package +x A guide for Noobs Dec 2021 by Ranger Smyth.

Welcome to Ranger's blog, where I will hold my research on Kali, with links to other sites in order to help you with your Kali Machine. Welcome to Linux.

Kali Linux 2021.4 released: Wider Samba compatibility, The Social-Engineer  Toolkit, new tools, and more! - Help Net Security

Instructions are below, but first an introduction as this is my first day.

Hi, I'm Ranger, a noob to Linux and a big big Kali Linux fan.

Why am I writing a blog, well it is also a bit of a diary of my travels while building my Kali Linux machine. I am not using any VM, as I have installed Kali Linux directly onto my Laptop's 2nd hard drive on a 3rd Partition using GRUB. My laptop boots right into the Kali login screen.

I only started to learn Linux this Oct 2021 and today been only about 8 weeks. So, as a noob I needed to find out the 'how', the 'why' and 'how to fix/install/delete' applications or on Linux they are called packages. I decided to blog so new comers to Linux can find help.

GitHub is a website that holds other peoples software, programs or packages for downloading to your machine. GitHub for Linux has a few steps in which you have to download, install then run.  


Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution

 

Pagodo

Pagodo automates Google searching for potentially vulnerable web pages and applications on the Internet. It replaces manually performing Google dork searches with a web GUI browser. (Opsdisk, 2021). https://github.com/opsdisk/pagodo

How to install Pagodo Github package. 

     $ git clone https://github.com/opsdisk/pagodo.git

$ chmod ugo+rwx pagodo 

$ cd pagoto 

$ pip install -r requirements.txt 

$ python3 ghdb_scraper.py (Update Database) 

 

An example to run the script that will output the results into a file.

Replace website.com with your URL.

$ python3 pagodo.py -d website.com -g all_google_dorks.txt > website.com.txt 

 

If you are having any problems or need more information check out HakByte: How to find anything on the internet with Google Dorks. They give instructions for install @ 09.03


Only use on a site your allowed to access.

 

Warning Google might ban your IP as it did my twice for using this package as it uses Google search engines and it seems that the enquiries are not liked by Google. Use a VPN to stop this from happening. Google didn't ban my IP in the end, just a warning it seems. I was running pagodo on my own website https://w3tech.org.

There is a package call yagooglesearch from GitHub and this seems to have stopped the Google Ban from happening during a search. https://github.com/opsdisk/yagooglesearch. I only found the link this morning as I was researching for this blog.
 

Kali Linux 2021.4a Download | TechSpot                    

Dorks Eye Google Hacking Dork Scraping and Searching Script

Dorks Eye is a script I made in python 3. With this tool, you can easily find Google Dorks. Dork Eye collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bots. (BullsEye0, 2021).
https://github.com/BullsEye0/dorks-eye

   $ Open a terminal on Kali

   $ sudo git clone https://github.com/BullsEye0/dorks-eye.git 

   $ cd dorks-eye 

   $ pip3 install -r requirements.txt 

   $ sudo chmod +x dorks-eye.py 

   $ python3 dorks-eye.py  

If you are having any trouble, this video guide will help. How To Install Dorks Eye | Google Dork Script Video Install Guide

Everything You Need To Know About Kali Linux | Edureka

Google Dorks list 

Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of 13.760 Dorks ..! This list is regularly updated !.. (BullsEye0, 2021). https://github.com/BullsEye0/google_dork_list

$ chmod ugo+rwx google_dork_list 

$ cd google_dork_list  

$ cat google_dork_list.txt 

 

 

182,864 Bonus Stock Photos and Images - 123RF 

 

BONUS Google Search Method!

You can use Google Search engine on Google.com to search for dorks, documents, passwords and any information you want by using different symbols in your search query, I am learning this method for researching a particular subject by excluding a lot of materials that are not needed, and i don't want. I JUST WANT WHAT I SEARCH FOR!!!! This method is wonderful and won't get you banned.

Find Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]

Cyber Weapons Lab, Dec 2021 write: A Google search may not be what one thinks of when it comes to hacking. However, Google offers advanced techniques when searching which can offer a treasure trove of hidden and vulnerable services if used correctly. Today, we'll introduce you to Google dorking, on this episode of Cyber Weapons Lab. To learn more, check out the article: https://nulb.app/#####

https://youtu.be/u_gOnwWEXiA 

There are a lot of typing for searching particular topics, so I have added this link to their site which has it already there to copy and paste. https://null-byte.wonderhowto.com/how-to/find-passwords-exposed-log-files-with-google-dorks-0198557/

 

To remove an empty directory, use either rmdir or rm -d followed by the directory name: 

$ rm -d dirname   

$ rmdir dirname.

 

 

 
 
 
Thank you and well done for making it this far, like me you have a long road of learning ahead of you. Now the packages are installed, it's time now to start to learn how to use them, being honest I have installed many packages but do not know how to use them. So a plan of learning one a day will help me to catch up. Today is Google Dorks.
Then to post up here as a guide in how to use and what I learnt!
 
Be safe,
Ranger.

No comments:

Post a Comment

How to Search Google from the Command Line

    Probe the world's most popular search engine without leaving the terminal   https://www.omgubuntu.co.uk/2021/11/best-comman...