DorkScout – Automate google dork scan against the entiere internet or specific targets
Dorking is the technique used for advanced searching. Dorking can be useful in target domain detection or forgetting some sensitive data from the target domain, This can be done through automated tools which can reduce the time of manual searching. DorkScout is a tool to automate the finding of vulnerable applications or hidden files around the internet through google searches, dorkscout first starts by retrieving the dork’s lists from https://www.exploit-db.com/google-hacking-database, and then it scans a given target or everything it endows. DorkScout tool is developed in Golang language and is available on the GitHub platform. DorkScout tool is open-source and free-to-use.
Note: DorkScout is a Golang language-based tool, so you need to have a Golang environment on your system. So check this link to Install Golang in your system. – Installation of Go Lang in Linux
Installation of DorkScout Tool on Kali Linux OS
Step 1: If you have downloaded Golang in your system, verify the installation by checking the version of Golang, use the following command.
Step 2: Get the DorkScout repository or clone the DorkScout tool from Github, use the following command.
sudo GO111MODULE=on go get -u github.com/R4yGM/dorkscout
Step 3: Change the directory to access the tool. Use the following command
Step 4: Check the help menu page to get a better understanding of the DorkScout tool, use the following command.
Working with DorkScout Tool on Kali Linux OS
Example 1: Scans a specific website for a list of dorks
dorkscout scan -d= “/home/kali/Desktop/dorkscout/dorks/Sensitive\ Directories.dorkscout” -H= “/home/kali/Desktop/dorkscout/results/”
We are displaying the list of dorks in the below screenshot.
We have got the results for our Dorking scan.
.html formatted results and displayed in the below screenshot.
Example 2: Install a list of dorks from exploit-db.com/ Install word-lists
dorkscout install -o /home/kali/Desktop/
In this example, we will be installing new and updated dorking lists for the exploit-db database.
Dorks are installed in the Desktop directory.
In the above screenshot, we can see that all the dork files are installed on the desktop directory. In the below screenshot, we have opened the “Network or Vulnerability Data.dorkscout” file which contains the dork query related to Network.