FOFA is a powerful search engine for cybersecurity professionals, enabling them to discover exposed assets, misconfigurations, and vulnerabilities. Below are key FOFA dorks for bug hunters:
1. HTTPS ports apart from 443
- Example: `port=”8443″ && protocol==”https”`
2. HTTP ports apart from 80
- Example: `port=”8080″ && protocol==”http”`
3. Cloud Buckets
- Example: `body=”AWS S3 Bucket”`
4. Metrics Endpoints or Similar
- Example: `title=”Prometheus Metrics”`
5. Registration Pages
- Example: `body=”register” && title=”signup”`
6. API Endpoints
- Example: `path=”/api/v1″`
7. Admin Endpoints
- Example: `title=”admin” || path=”/admin”`
8. Information Disclosure
- Example: `body=”index of /”`
9. API Keys in JS Files
- Example: `extension=”js” && body=”api_key”`
10. Vulnerable Endpoints
- Example: `body=”wp-json/wp/v2/users”`
🔗 Reference: FOFA Dorking Guide
You Should Know:
Practical FOFA Dorking Commands & Techniques
1. Finding Exposed Databases
Elasticsearch fofa 'port="9200" && protocol=="http"' MongoDB fofa 'port="27017" && protocol=="mongodb"'
2. Discovering Misconfigured Web Servers
Nginx Directory Listing fofa 'server=="nginx" && body="index of /"' Apache Server Status fofa 'server=="apache" && title="server-status"'
3. Hunting for API Keys
AWS Keys in JS Files fofa 'extension=="js" && (body=="AKIA" || body=="aws_access_key")' Google API Keys fofa 'body=="AIza" && extension=="js"'
4. Detecting Exposed Admin Panels
WordPress Admin fofa 'title=="wp-admin" && body=="wordpress"' Jenkins fofa 'title=="Jenkins" && port=="8080"'
5. Identifying Cloud Buckets
AWS S3 Buckets fofa 'body="NoSuchBucket" || body="AccessDenied"' Google Cloud Storage fofa 'body="storage.googleapis.com"'
What Undercode Say:
FOFA dorking is an essential skill for bug hunters, enabling rapid discovery of exposed assets. Mastering these queries helps in identifying misconfigurations before attackers do. Always verify findings responsibly and report vulnerabilities ethically.
Expected Output:
- A list of exposed endpoints, APIs, and misconfigured services.
- Actionable intelligence for penetration testers and security researchers.
Prediction:
As cloud adoption grows, FOFA dorking will become even more critical in uncovering exposed assets. Automation tools integrating FOFA queries will emerge, making reconnaissance faster and more efficient.
References:
Reported By: Abhirup Konwar – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅