Skip to main content

Google Dorking

This Integration is part of the Google Dorking Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.2.0 and later.

Automate the process of google dorking searches in order to detect leaked data.

Configure Google Dorking in Cortex#

ParameterDescriptionRequired
Search engine IDTrue
API KeyTrue
File Types to SearchComma separated file types that'll be searched and downloaded.True
Search KeywordsComma separated keywords to look for in the files.False
Sites To SearchProvide a single or comma separated list of sites from which to perform the search on.True
Fetch incidentsFalse
Incident typeFalse
Maximum number of incidents per fetchFalse
First fetch timeFalse
Trust any certificate (not secure)False
Use system proxy settingsFalse
Incidents Fetch IntervalFalse

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

google-dorking-search#


Use the google search engine to search a query.

Base Command#

google-dorking-search

Input#

Argument NameDescriptionRequired
afterSearch after this date. Expected format: YYYY-MM-DD.Optional
file_typesComma separated file types that'll be searched and downloaded.Optional
keywordsComma separated keywords to look for in the files.Optional
urlsProvide a single or comma separated list of sites from which to perform the search on.Optional

Context Output#

There is no context output for this command.

Command Example#

Human Readable Output#