Open In App

DorkScout – Automate google dork scan against the entire internet or specific targets

Improve
Improve
Like Article
Like
Save
Share
Report

Dorking is the technique used for advanced searching. Dorking can be useful in target domain detection or forgetting some sensitive data from the target domain, This can be done through automated tools which can reduce the time of manual searching. DorkScout is a tool to automate the finding of vulnerable applications or hidden files around the internet through google searches, dorkscout first starts by retrieving the dork’s lists from https://www.exploit-db.com/google-hacking-database, and then it scans a given target or everything it endows. DorkScout tool is developed in Golang language and is available on the GitHub platform. DorkScout tool is open-source and free-to-use.

Note: DorkScout is a Golang language-based tool, so you need to have a Golang environment on your system. So check this link to Install  Golang in your system. – Installation of Go Lang in Linux

Installation of DorkScout Tool on Kali Linux OS

Step 1: If you have downloaded Golang in your system, verify the installation by checking the version of Golang, use the following command.

go version

Step 2: Get the DorkScout repository or clone the DorkScout tool from Github, use the following command.

sudo GO111MODULE=on go get -u github.com/R4yGM/dorkscout

Step 3: Change the directory to access the tool. Use the following command

cd go/bin

Step 4: Check the help menu page to get a better understanding of the DorkScout tool, use the following command.

dorkscout -h

Working with DorkScout Tool on Kali Linux OS

Example 1:  Scans a specific website for a list of dorks

dorkscout scan -d= “/home/kali/Desktop/dorkscout/dorks/Sensitive\ Directories.dorkscout” -H= “/home/kali/Desktop/dorkscout/results/”

We are displaying the list of dorks in the below screenshot.

We have got the results for our Dorking scan.

.html formatted results and displayed in the below screenshot.

Example 2: Install a list of dorks from exploit-db.com/ Install word-lists

dorkscout install -o /home/kali/Desktop/

In this example, we will be installing new and updated dorking lists for the exploit-db database.

Dorks are installed in the Desktop directory.

In the above screenshot, we can see that all the dork files are installed on the desktop directory. In the below screenshot, we have opened the “Network or Vulnerability Data.dorkscout” file which contains the dork query related to Network.


Last Updated : 29 Nov, 2022
Like Article
Save Article
Previous
Next
Share your thoughts in the comments
Similar Reads