Skip to main content

Google Dorking

This Integration is part of the Google Dorking Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.2.0 and later.

Automate the process of google dorking searches in order to detect leaked data.

Configure Google Dorking on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for Google Dorking.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Search engine IDTrue
    API KeyTrue
    File Types to SearchComma separated file types that'll be searched and downloaded.True
    Search KeywordsComma separated keywords to look for in the files.False
    Sites To SearchProvide a single or comma separated list of sites from which to perform the search on.True
    Fetch incidentsFalse
    Incident typeFalse
    Maximum number of incidents per fetchFalse
    First fetch timeFalse
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    Incidents Fetch IntervalFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

google-dorking-search#


Use the google search engine to search a query.

Base Command#

google-dorking-search

Input#

Argument NameDescriptionRequired
afterSearch after this date. Expected format: YYYY-MM-DD.Optional
file_typesComma separated file types that'll be searched and downloaded.Optional
keywordsComma separated keywords to look for in the files.Optional
urlsProvide a single or comma separated list of sites from which to perform the search on.Optional

Context Output#

There is no context output for this command.

Command Example#

Human Readable Output#